Download
| Alert*
oval:org.secpod.oval:def:66167
The operating system installed on the system is Microsoft Windows Server 1909. oval:org.secpod.oval:def:67678 Microsoft is aware of a vulnerability involving DNS cache poisoning caused by IP fragmentation that affects Windows DNS Resolver. An attacker who successfully exploited this vulnerability could spoof the DNS packet which can be cached by the DNS Forwarder or the DNS Resolver. oval:org.secpod.oval:def:73758 Media Foundation Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:73842 The host is missing a critical security update for KB5004245 oval:org.secpod.oval:def:71063 The host is missing a critical security update for KB5001337 oval:org.secpod.oval:def:69988 Windows Error Reporting Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69993 Windows Hyper-V Remote Code Execution Vulnerability. Any Hyper-V client which is configured to use the Plan 9 file system could be vulnerable. An authenticated attacker who successfully exploited this vulnerability on a Hyper-V client could cause code to execute on the Hyper-V server. oval:org.secpod.oval:def:70013 Windows Win32k Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70015 Windows DNS Server Denial of Service Vulnerability. This vulnerability impacts any DNS server. The surrounding configuration can limit possible vectors/sources for the attack, but proper mitigation requires this month's security update patch. oval:org.secpod.oval:def:70010 Windows DNS Server Remote Code Execution Vulnerability. This vulnerability impacts any DNS server. The surrounding configuration can limit possible vectors/sources for the attack, but proper mitigation requires this month's security update patch. oval:org.secpod.oval:def:70006 Windows DNS Server Remote Code Execution Vulnerability. This vulnerability impacts any DNS server. The surrounding configuration can limit possible vectors/sources for the attack, but proper mitigation requires this month's security update patch. oval:org.secpod.oval:def:70007 Windows DNS Server Remote Code Execution Vulnerability. This vulnerability impacts any DNS server. The surrounding configuration can limit possible vectors/sources for the attack, but proper mitigation requires this month's security update patch. oval:org.secpod.oval:def:70008 Windows DNS Server Remote Code Execution Vulnerability. This vulnerability impacts any DNS server. The surrounding configuration can limit possible vectors/sources for the attack, but proper mitigation requires this month's security update patch. oval:org.secpod.oval:def:70009 Windows DNS Server Remote Code Execution Vulnerability. This vulnerability impacts any DNS server. The surrounding configuration can limit possible vectors/sources for the attack, but proper mitigation requires this month's security update patch. oval:org.secpod.oval:def:70000 Windows DNS Server Remote Code Execution Vulnerability. This vulnerability impacts any DNS server. The surrounding configuration can limit possible vectors/sources for the attack, but proper mitigation requires this month's security update patch. oval:org.secpod.oval:def:69055 The host is missing an important security update for KB4601056 oval:org.secpod.oval:def:68215 Hyper-V Denial of Service Vulnerability oval:org.secpod.oval:def:67670 Kerberos Security Feature Bypass Vulnerability oval:org.secpod.oval:def:67706 The host is missing an important security update for KB4592449 oval:org.secpod.oval:def:70053 The host is missing an important security update for KB5000808 oval:org.secpod.oval:def:69081 The host is missing a critical security update for KB4601315 oval:org.secpod.oval:def:69034 Windows Fax Service Remote Code Execution Vulnerability oval:org.secpod.oval:def:66866 Win32k Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66886 Windows Update Orchestrator Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66887 Windows Update Orchestrator Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66889 Windows Update Orchestrator Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66918 Windows Bind Filter Driver Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:66927 Kerberos Security Feature Bypass Vulnerability oval:org.secpod.oval:def:66928 Windows Network File System Remote Code Execution Vulnerability. oval:org.secpod.oval:def:66625 The host is installed with Microsoft Windows 7 and above and is prone to a windows kernel zero day vulnerability. A flaw is present in the application, which fails to handle Windows Kernel Cryptography Driver. Successful exploitation allows attackers to perform a privilege escalation (such as sandbo ... oval:org.secpod.oval:def:68183 Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68205 Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66875 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66874 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66877 Windows Kernel Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66876 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66879 Win32k Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66880 Windows Print Configuration Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66882 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66881 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66884 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66883 Windows KernelStream Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:66864 Windows Graphics Component Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. oval:org.secpod.oval:def:66863 Windows Print Spooler Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66865 Windows Error Reporting Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66868 Windows Print Spooler Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66867 Win32k Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process. oval:org.secpod.oval:def:66869 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66871 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66870 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66873 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66872 Windows Remote Access Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66885 Windows Win32k Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66888 Windows USO Core Worker Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66890 Windows Update Stack Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66856 Windows Spoofing Vulnerability oval:org.secpod.oval:def:66860 DirectX Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66891 Windows Common Log File System Driver Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68207 Windows Kernel Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68208 Windows Bluetooth Security Feature Bypass Vulnerability oval:org.secpod.oval:def:68209 Windows Bluetooth Security Feature Bypass Vulnerability oval:org.secpod.oval:def:68210 Windows AppX Deployment Extensions Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68213 Windows CSC Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66916 Remote Desktop Protocol Server Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized read access to Windows RDP server process. oval:org.secpod.oval:def:66917 Windows Port Class Library Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:66919 Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67677 The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. oval:org.secpod.oval:def:66930 Windows GDI+ Remote Code Execution Vulnerability oval:org.secpod.oval:def:66932 Windows Update Medic Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66931 Windows NDIS Information Disclosure Vulnerability oval:org.secpod.oval:def:66934 Windows Kernel Local Elevation of Privilege Vulnerability oval:org.secpod.oval:def:66933 Windows Delivery Optimization Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the me ... oval:org.secpod.oval:def:66935 Microsoft Defender for Endpoint Security Feature Bypass Vulnerability. oval:org.secpod.oval:def:68200 The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:68203 NTLM Security Feature Bypass Vulnerability oval:org.secpod.oval:def:68201 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:68202 Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability oval:org.secpod.oval:def:66921 Windows MSCTF Server Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:66920 Windows Canonical Display Driver Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the ... oval:org.secpod.oval:def:66923 Windows Hyper-V Security Feature Bypass Vulnerability. oval:org.secpod.oval:def:66922 Windows Function Discovery SSDP Provider Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressin ... oval:org.secpod.oval:def:66925 Windows Error Reporting Denial of Service Vulnerability. oval:org.secpod.oval:def:66924 Windows Print Spooler Remote Code Execution Vulnerability oval:org.secpod.oval:def:66926 Windows Network File System Denial of Service Vulnerability oval:org.secpod.oval:def:66929 Windows Network File System Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process. oval:org.secpod.oval:def:67647 A local attacker could run a specially crafted application that would elevate the attacker's privileges. A remote attacker with SMBv2 access to a vulnerable system could send specially crafted requests over a network to exploit this vulnerability and execute code on the target system. oval:org.secpod.oval:def:67648 Windows Digital Media Receiver Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68180 Windows AppX Deployment Extensions Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68181 Windows WLAN Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68184 Windows CSC Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68185 Windows CSC Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68182 While this issue is labeled as an elevation of privilege, it can also be exploited to disclose information. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:68188 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:68189 Windows CSC Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67650 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68186 Windows CSC Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68187 Windows CSC Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67652 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67651 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67653 Windows Overlay Filter Security Feature Bypass Vulnerability oval:org.secpod.oval:def:68179 Windows Bluetooth Security Feature Bypass Vulnerability oval:org.secpod.oval:def:67667 Windows Backup Engine Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67666 Windows Backup Engine Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67669 Windows Backup Engine Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67668 Windows Backup Engine Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67672 The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system. oval:org.secpod.oval:def:67671 Windows Network Connections Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67674 The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:67673 To exploit this vulnerability, an attacker could run a specially crafted application on a Hyper-V guest that could cause the Hyper-V host operating system to execute arbitrary code when it fails to properly validate vSMB packet data. oval:org.secpod.oval:def:68191 Windows Installer Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68190 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:68195 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:68196 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:68193 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:68194 GDI+ Remote Code Execution Vulnerability oval:org.secpod.oval:def:68199 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:67663 Windows Backup Engine Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67665 Windows Backup Engine Elevation of Privilege Vulnerability oval:org.secpod.oval:def:67664 Windows Backup Engine Elevation of Privilege Vulnerability oval:org.secpod.oval:def:69004 The host is installed with .NEt Framework and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to perform denial of service attacks. oval:org.secpod.oval:def:68218 To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine. oval:org.secpod.oval:def:68219 Windows Print Spooler Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68217 Windows CSC Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68221 Windows InstallService Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68222 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:68220 The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:68226 Windows Hyper-V Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68223 Remote Procedure Call Runtime Remote Code Execution Vulnerability oval:org.secpod.oval:def:68224 Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68238 Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting ad ... oval:org.secpod.oval:def:68239 Windows Multipoint Management Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68240 Windows (modem.sys) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:68241 Windows LUAFV Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68229 Microsoft Windows Media Foundation Remote Code Execution Vulnerability oval:org.secpod.oval:def:68227 The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:68228 Windows Win32k Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68232 Active Template Library Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68233 Windows Runtime C++ Template Library Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68230 Windows DNS Query Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:68231 Windows Docker Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secret data encrypted with DP API can be decrypted. oval:org.secpod.oval:def:68236 Windows Event Tracing Elevation of Privilege Vulnerability oval:org.secpod.oval:def:68237 Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability oval:org.secpod.oval:def:68234 TPM Device Driver Information Disclosure Vulnerability.The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:68235 Windows Fax Compose Form Remote Code Execution Vulnerability oval:org.secpod.oval:def:69989 DirectX Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69987 Windows Print Spooler Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system. oval:org.secpod.oval:def:69992 Windows Win32k Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69990 Windows Graphics Component Remote Code Execution Vulnerability. oval:org.secpod.oval:def:69996 Windows Event Tracing Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69997 Windows User Profile Service Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69994 Windows Graphics Component Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69998 Windows Win32k Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69999 OpenType Font Parsing Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70011 Windows Event Tracing Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69032 Microsoft Windows VMSwitch Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:69030 Windows TCP/IP Remote Code Execution Vulnerability oval:org.secpod.oval:def:69035 Windows Backup Engine Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. oval:org.secpod.oval:def:69036 Windows Trust Verification API Denial of Service Vulnerability oval:org.secpod.oval:def:69033 Windows Fax Service Remote Code Execution Vulnerability. oval:org.secpod.oval:def:69039 Windows Address Book Remote Code Execution Vulnerability. oval:org.secpod.oval:def:69037 Microsoft Windows Codecs Library Remote Code Execution Vulnerability oval:org.secpod.oval:def:69038 Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability oval:org.secpod.oval:def:70002 Microsoft Windows Media Foundation Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70003 Windows Media Photo Codec Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory ... oval:org.secpod.oval:def:70005 Windows Update Stack Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70001 Windows Print Spooler Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:69024 Windows Win32k Elevation of Privilege Vulnerability oval:org.secpod.oval:def:69025 Windows Fax Service Remote Code Execution Vulnerability oval:org.secpod.oval:def:69028 Windows Win32k Elevation of Privilege Vulnerability oval:org.secpod.oval:def:69029 Windows Remote Procedure Call Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. oval:org.secpod.oval:def:69026 Windows Installer Elevation of Privilege Vulnerability oval:org.secpod.oval:def:69027 PFX Encryption Security Feature Bypass Vulnerability. When exporting a SID-protected PFX file, keys encrypted using AES are not properly protected. Any SID-protected PFX files using AES for key encryption should be regenerated and exported after this update is installed. oval:org.secpod.oval:def:69050 Windows Event Tracing Elevation of Privilege Vulnerability oval:org.secpod.oval:def:69051 Windows DirectX Information Disclosure Vulnerability oval:org.secpod.oval:def:69052 Windows PKU2U Elevation of Privilege Vulnerability. PKU2U is a peer-to-peer authentication protocol. This setting prevents online identities from authenticating to domain-joined systems. Authentication will be centrally managed with Windows user accounts. oval:org.secpod.oval:def:69042 Windows Local Spooler Remote Code Execution Vulnerability. oval:org.secpod.oval:def:69043 Windows Camera Codec Pack Remote Code Execution Vulnerability oval:org.secpod.oval:def:69040 Windows Mobile Device Management Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system. oval:org.secpod.oval:def:69041 Windows TCP/IP Denial of Service Vulnerability. IPv6 Link-local addresses are not routable on the internet and are not reachable by remote attackers. An attack would need to originate from the same logical network segment for systems that are ONLY configured with IPv6 Link-local addresses. oval:org.secpod.oval:def:69047 Windows Console Driver Denial of Service Vulnerability. oval:org.secpod.oval:def:69044 Windows Graphics Component Remote Code Execution Vulnerability oval:org.secpod.oval:def:69045 Windows TCP/IP Remote Code Execution Vulnerability. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an atta ... oval:org.secpod.oval:def:69048 Windows Event Tracing Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70978 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70979 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70974 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70975 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70976 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70977 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70970 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70971 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70972 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70973 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70967 Microsoft Internet Messaging API Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70968 The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:70969 NTFS Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70963 Azure AD Web Sign-in Security Feature Bypass Vulnerability. oval:org.secpod.oval:def:70964 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70965 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70966 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70046 Application Virtualization Remote Code Execution Vulnerability oval:org.secpod.oval:def:70047 Windows Container Execution Agent Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70960 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70048 Windows Extensible Firmware Interface Security Feature Bypass Vulnerability oval:org.secpod.oval:def:70961 In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the ... oval:org.secpod.oval:def:70962 In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the ... oval:org.secpod.oval:def:70042 Windows NAT Denial of Service Vulnerability oval:org.secpod.oval:def:70043 Storage Spaces Controller Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70044 Remote Access API Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70045 User Profile Service Denial of Service Vulnerability oval:org.secpod.oval:def:70996 Windows Media Photo Codec Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:70992 Windows GDI+ Remote Code Execution Vulnerability oval:org.secpod.oval:def:70993 Windows GDI+ Remote Code Execution Vulnerability oval:org.secpod.oval:def:70994 Windows GDI+ Remote Code Execution Vulnerability oval:org.secpod.oval:def:70995 Windows GDI+ Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:70990 Windows DNS Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:70991 Windows DNS Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:70989 Windows AppX Deployment Server Denial of Service Vulnerability oval:org.secpod.oval:def:70981 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70982 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70983 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70984 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70980 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70014 Windows Event Tracing Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70016 Windows Win32k Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70012 Windows UPnP Device Host Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70956 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70957 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70958 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70959 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70039 Windows ActiveX Installer Service Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system. oval:org.secpod.oval:def:70952 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70953 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70954 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70955 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70035 Windows App-V Overlay Filter Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70036 Windows Virtual Registry Provider Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70037 Windows Container Execution Agent Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70950 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70038 Windows Update Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70951 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70033 Windows Update Stack Setup Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70034 Windows Event Tracing Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:70040 Windows Projected File System Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70041 Windows Overlay Filter Elevation of Privilege Vulnerability oval:org.secpod.oval:def:70945 The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system. oval:org.secpod.oval:def:70946 The bug allows an attacker to escalate privileges by running a specially crafted program on a target system. This does mean that they will either need to log on to a system or trick a legitimate user into running the code on their behalf. Considering who is listed as discovering this bug, it is prob ... oval:org.secpod.oval:def:70948 Windows NTFS Denial of Service Vulnerability. oval:org.secpod.oval:def:70949 Remote Procedure Call Runtime Remote Code Execution Vulnerability. oval:org.secpod.oval:def:71026 Windows Hyper-V Security Feature Bypass Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Guest VM to Hyper-V host server - virtualization security boundary. oval:org.secpod.oval:def:71025 Windows Hyper-V Security Feature Bypass Vulnerability. This bypass could affect any Hyper-V configurations that are using Router Guard. Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencing router path ... oval:org.secpod.oval:def:71028 Windows Hyper-V Denial of Service Vulnerability. An attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. This can cause the host OS to crash by sending specially crafted request. oval:org.secpod.oval:def:71027 Windows Hyper-V Security Feature Bypass Vulnerability. oval:org.secpod.oval:def:71022 Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:71021 Windows Speech Runtime Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:71024 Windows Overlay Filter Security Feature Bypass Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:71023 Win32k Elevation of Privilege Vulnerability oval:org.secpod.oval:def:71019 Windows Speech Runtime Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:71018 Windows TCP/IP Driver Denial of Service Vulnerability. oval:org.secpod.oval:def:71015 Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability oval:org.secpod.oval:def:71017 Windows TCP/IP Driver Denial of Service Vulnerability oval:org.secpod.oval:def:71016 Windows TCP/IP Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:71011 Windows Console Driver Denial of Service Vulnerability oval:org.secpod.oval:def:71010 Windows Console Driver Denial of Service Vulnerability oval:org.secpod.oval:def:71013 Windows SMB Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process. oval:org.secpod.oval:def:71012 Windows Application Compatibility Cache Denial of Service Vulnerability. oval:org.secpod.oval:def:71020 Windows Speech Runtime Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:70997 Windows Network File System Remote Code Execution Vulnerability. oval:org.secpod.oval:def:70998 Windows Event Tracing Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:70999 Windows Event Tracing Elevation of Privilege Vulnerability. oval:org.secpod.oval:def:71008 Windows Installer Elevation of Privilege Vulnerability oval:org.secpod.oval:def:71007 Windows Installer Spoofing Vulnerability oval:org.secpod.oval:def:71009 Windows Installer Elevation of Privilege Vulnerability oval:org.secpod.oval:def:71004 Windows Kernel Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. oval:org.secpod.oval:def:71006 Windows Kernel Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:71005 Windows Portmapping Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:71000 Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability. oval:org.secpod.oval:def:71002 Windows Services and Controller App Elevation of Privilege Vulnerability oval:org.secpod.oval:def:71001 Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability. oval:org.secpod.oval:def:71848 Windows SSDP Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:71849 OLE Automation Remote Code Execution Vulnerability oval:org.secpod.oval:def:71844 Windows Graphics Component Elevation of Privilege Vulnerability oval:org.secpod.oval:def:71846 Windows Projected File System FS Filter Driver Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:71840 Microsoft Bluetooth Driver Spoofing Vulnerability oval:org.secpod.oval:def:71842 Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. oval:org.secpod.oval:def:71841 Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space f ... oval:org.secpod.oval:def:71836 Windows Container Manager Service Elevation of Privilege Vulnerability oval:org.secpod.oval:def:71839 Windows Graphics Component Elevation of Privilege Vulnerability oval:org.secpod.oval:def:71832 Windows CSC Service Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. oval:org.secpod.oval:def:71831 Hyper-V Remote Code Execution Vulnerability. This issue allows a guest VM to force the Hyper-V host's kernel to read from an arbitrary, potentially invalid address. The contents of the address read would not be returned to the guest VM. In most circumstances, this would result in a denial of service ... oval:org.secpod.oval:def:71804 Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability oval:org.secpod.oval:def:69049 Microsoft Windows Security Feature Bypass Vulnerability oval:org.secpod.oval:def:68244 The host is missing an important security update for KB4598229 oval:org.secpod.oval:def:68197 Windows Remote Desktop Security Feature Bypass Vulnerability oval:org.secpod.oval:def:75283 Rich Text Edit Control Information Disclosure Vulnerability oval:org.secpod.oval:def:71868 The host is missing a critical security update for KB5003169 oval:org.secpod.oval:def:71828 Windows Wireless Networking Information Disclosure Vulnerability oval:org.secpod.oval:def:71829 Windows Wireless Networking Spoofing Vulnerability oval:org.secpod.oval:def:71830 Windows Wireless Networking Spoofing Vulnerability |