Download
| Alert*
oval:org.secpod.oval:def:6716
Microsoft SQL Server 2008 Service Pack 3 is installed oval:org.secpod.oval:def:5104 The host is missing a critical security update according to Microsoft security bulletin, MS12-027. The update is required to fix a remote code execution vulnerability. A flaw is present in Windows common controls, which fails to handle a website containing specially crafted content. Successful explo ... oval:org.secpod.oval:def:6721 The host is missing a critical security update according to MS12-060. The update is required to fix remote code execution vulnerability. A flaw is present in the application, which is caused when an ActiveX control corrupts the system state. Successful exploitation allows attackers to execute arbitr ... oval:org.secpod.oval:def:7325 The host is missing an Important security update according to Microsoft security bulletin, MS12-070. The update is required to fix privilege escalation vulnerability in SQL Server. A flaw is present in SQL Server running SQL Server Reporting Services, which fails to handle SQL Server Report Manager ... oval:org.secpod.oval:def:7327 The host is installed with SQL Server 2000 Reporting Services Service or 2005 SP4 or 2008 SP2 or SP3 or 2008 R2 SP1 or 2012 and is prone to reflected XSS vulnerability. A flaw is present in the application, which fails to handle SQL Server Report Manager input parameters. Successful exploitation cou ... oval:org.secpod.oval:def:25405 The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which improperly casts pointers to an incorrect class. Successful exploitation could allow attackers to gain elevated privileges ... oval:org.secpod.oval:def:25409 The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to a remote code execution vulnerability. A flaw is present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation could allow attackers to take co ... oval:org.secpod.oval:def:25410 The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to a remote code execution vulnerability. A flaw is present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation could allow attackers to take co ... oval:org.secpod.oval:def:20809 The host is missing an important security update according to Microsoft security bulletin, MS14-044. The update is required to fix multiple elevation of privilege vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attack ... oval:org.secpod.oval:def:20808 The host is installed with Microsoft SQL Server 2008, 2008 R2 or 2012 and is prone to a stack overrun vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to stop responding until a manual reboot is initiated. oval:org.secpod.oval:def:25411 The host is missing an Important security update according to Microsoft security bulletin, MS15-058. The update is required to fix a multiple vulnerabilities. The flaws are present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation ... oval:org.secpod.oval:def:6713 The host is installed with Microsoft Office 2003, Office 2003 Web Components, Microsoft Office 2007, 2010, Microsoft Host Integration Server 2004 , Microsoft Visual FoxPro 8.0, 9.0 or Visual Basic 6.0 Runtime, Microsoft SQL Server 2000, 2005, 2008, 2008 R2 and is prone to remote code execution vulne ... |