[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:5847
Microsoft Exchange Server 2010 SP2 is installed

oval:org.secpod.oval:def:6701
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6700
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6705
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6704
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6703
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6702
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6706
The host is missing a critical security update according to Microsoft security bulletin, MS12-058. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted file through Outlook Web Access in a br ...

oval:org.secpod.oval:def:6697
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6696
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6695
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6694
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6699
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6698
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:6693
The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ...

oval:org.secpod.oval:def:9279
The host is installed with Microsoft Exchange Server 2007 or 2010 and is prone to remote code execution vulnerability. A flaw is present in the application, which is caused when WebReady Document Viewer is used to preview a specially crafted file. Successful exploitation allows attackers to run arbi ...

oval:org.secpod.oval:def:8186
The host is installed with Exchange Server 2007 or Exchange Server 2010 and is prone to remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server, which fails to properly handle WebReady Document Viewing feature. Successful exploitation could allow to run code on ...

oval:org.secpod.oval:def:8187
The host is installed with Exchange Server 2007 or Exchange Server 2010 and is prone to remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server, which fails to properly handle WebReady Document Viewing feature. Successful exploitation could allow to run code on ...

oval:org.secpod.oval:def:9277
The host is installed with Microsoft Exchange Server 2007 or 2010 and is prone to denial of service vulnerability. A flaw is present in the application, which is caused when WebReady Document Viewer is used to preview a specially crafted file. Successful exploitation allows context-dependent attacke ...

oval:org.secpod.oval:def:9278
The host is missing a critical security update according to Microsoft bulletin, MS13-012. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which are caused when WebReady Document Viewer is used to preview a specially crafted file. Successful exploitat ...

oval:org.secpod.oval:def:8184
The host is missing a critical security update according to Microsoft security bulletin, MS12-080. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server, which fails to properly handle the WebReady Document Viewing and Outlook Web ...

oval:org.secpod.oval:def:8185
The host is installed with Exchange Server 2007 or Exchange Server 2010 and is prone to denial of service vulnerability. A flaw is present in the Microsoft Exchange Server, which fails to properly handle the RSS feeds. Successful exploitation could cause exchange databases to dismount, and potential ...

oval:org.secpod.oval:def:14831
The host is installed with Microsoft Exchange Server 2007, 2010 or 2013 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to run code on the affected Exchange Server.

oval:org.secpod.oval:def:14832
The host is missing a critical security update according to Microsoft security bulletin, MS13-061. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to run cod ...

oval:org.secpod.oval:def:14830
The host is installed with Microsoft Exchange Server 2007, 2010 or 2013 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to run code on the affected Exchange Server.

oval:org.secpod.oval:def:14828
The host is installed with Microsoft Exchange Server 2007, 2010 or 2013 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to run code on the affected Exchange Server.

oval:org.secpod.oval:def:15688
The host is installed with Microsoft Windows SharePoint Services 2.0, 3.0 SP3, SharePoint Server 2007 SP3, SharePoint Foundation 2010 SP1, SP2, SharePoint Server 2010 SP1, SP2, Exchange Server 2007, Exchange Server 2010, or Exchange Server 2013 and is prone to remote code execution vulnerability. A ...

oval:org.secpod.oval:def:16208
The host is installed with Exchange Server 2007, Exchange Server 2010, or Exchange Server 2013 and is prone an OWA xss vulnerability. A flaw is present in the application, which fails to handle a specially crafted data. Successful exploitation could allow attackers to run script in the context of th ...

oval:org.secpod.oval:def:16209
The host is missing a critical security update according to Microsoft security bulletin, MS13-105. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted file. Successful exploitation could allow attackers to execut ...

oval:org.secpod.oval:def:16206
The host is installed with Exchange Server 2010 or Exchange Server 2013 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a crafted URL. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

oval:org.secpod.oval:def:16207
The host is installed with Exchange Server 2007, Exchange Server 2010, or Exchange Server 2013 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted file. Successful exploitation could allow attackers to execute arbitrary code o ...

*CPE
cpe:/a:microsoft:exchange:2010:sp2

© SecPod Technologies