Download
| Alert*
oval:org.secpod.oval:def:6040
Microsoft Communicator 2007 R2 is installed. oval:org.secpod.oval:def:10959 The host is installed with microsoft Lync Attendee 2010, Lync 2010, Lync server 2013 or Office Communicator 2007 R2 and is prone to remote code execution vulnerability. A flaw is present in the applications, which attempts to access an object in memory that has been deleted. Successful exploitation ... oval:org.secpod.oval:def:10961 The host is missing an important security update according to Microsoft bulletin, MS13-041. The update is required to fix remote code execution vulnerability. A flaw is present in the applications, which attempts to access an object in memory that has been deleted. Successful exploitation allows att ... oval:org.secpod.oval:def:7318 The host is installed with Microsoft Office Web Apps 2010, Microsoft SharePoint Foundation 2010 Service Pack 1, Microsoft Windows SharePoint Services 3.0 Service Pack 2, Microsoft Groove Server 2010 Service Pack 1, Microsoft SharePoint Server 2010 Service Pack 1, Microsoft SharePoint Server 2007 Se ... oval:org.secpod.oval:def:7319 The host is missing an important security update according to Microsoft security bulletin, MS12-066. The update is required to fix elevation of privilege vulnerability. A flaw is present in the applications, which fail to properly validate the HTML strings. Successful exploitation allows attackers t ... oval:org.secpod.oval:def:6037 The host is installed with Internet Explorer 8 and 9 or Microsoft Communicator 2007 R2 or Lync 2010 or Lync 2010 Attendee Microsoft InfoPath 2007 or 2010, Microsoft SharePoint Server 2007 or 2010, Microsoft SharePoint Foundation 2010, Microsoft SharePoint Services 3.0 or Microsoft Groove Server 2010 ... oval:org.secpod.oval:def:6054 The host is missing an important security update according to MS12-039. The update is required to fix remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle specially crafted TrueType fonts. Successful exploitation allows remote attackers to execute ar ... |