Download
| Alert*
oval:org.secpod.oval:def:49149
The host is missing an important security update for KB4467678 oval:org.secpod.oval:def:49147 The host is missing an important security update for KB4467106 oval:org.secpod.oval:def:49155 The host is missing an important security update for KB4467700 oval:org.secpod.oval:def:49158 The host is missing an important security update for KB4467703 oval:org.secpod.oval:def:49159 The host is missing an important security update for KB4467706 oval:org.secpod.oval:def:49156 The host is missing an important security update for KB4467701 oval:org.secpod.oval:def:49746 The host is missing an important security update for KB4471322 oval:org.secpod.oval:def:49743 The host is missing an important security update for KB4471319 oval:org.secpod.oval:def:49749 The host is missing an important security update for KB4471325 oval:org.secpod.oval:def:49754 The host is missing an important security update for KB4471330 oval:org.secpod.oval:def:49752 The host is missing an important security update for KB4471328 oval:org.secpod.oval:def:49750 The host is missing an important security update for KB4471326 oval:org.secpod.oval:def:45434 The host is missing an important security update for KB4131188 oval:org.secpod.oval:def:49148 The host is missing an important security update for KB4467107 oval:org.secpod.oval:def:49154 The host is missing an important security update for KB4467697 oval:org.secpod.oval:def:47159 The host is missing a critical security update for KB4340939 oval:org.secpod.oval:def:49744 The host is missing a critical security update for KB4471320 oval:org.secpod.oval:def:49742 The host is missing a critical security update for KB4471318 oval:org.secpod.oval:def:50742 The host is missing an important security update for KB4486563 oval:org.secpod.oval:def:50743 The host is missing an important security update for KB4486564 oval:org.secpod.oval:def:50744 The host is missing an important security update for KB4486993 oval:org.secpod.oval:def:50746 The host is missing an important security update for KB4487000 oval:org.secpod.oval:def:50749 The host is missing an important security update for KB4487019 oval:org.secpod.oval:def:50751 The host is missing an important security update for KB4487023 oval:org.secpod.oval:def:50752 The host is missing an important security update for KB4487025 oval:org.secpod.oval:def:50754 The host is missing an important security update for KB4487028 oval:org.secpod.oval:def:49101 A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attac ... oval:org.secpod.oval:def:54704 A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially crafted packets. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server.To exploit the vulnerability, a remote unauthenticated attacker could send a spe ... oval:org.secpod.oval:def:54750 The host is missing an important security update 4499175 oval:org.secpod.oval:def:54743 The host is missing an important security update for KB4499151 oval:org.secpod.oval:def:54742 The host is missing an important security update for KB4499149 oval:org.secpod.oval:def:54747 The host is missing an important security update 4499165 oval:org.secpod.oval:def:54745 The host is missing an important security update 4499158 oval:org.secpod.oval:def:54746 The host is missing an important security update for KB4499164 oval:org.secpod.oval:def:54749 The host is missing an important security update for KB4499171 oval:org.secpod.oval:def:54752 The host is missing an important security update 4499180 oval:org.secpod.oval:def:54200 The host is missing an important security update for KB4493472 oval:org.secpod.oval:def:54192 The host is missing an important security update for KB4493448 oval:org.secpod.oval:def:54193 The host is missing an important security update for KB4493450 oval:org.secpod.oval:def:54191 The host is missing an important security update for KB4493446 oval:org.secpod.oval:def:54197 The host is missing an important security update for KB4493467 oval:org.secpod.oval:def:54194 The host is missing an important security update for KB4493451 oval:org.secpod.oval:def:54195 The host is missing an important security update for KB4493458 oval:org.secpod.oval:def:54199 The host is missing an important security update for KB4493471 oval:org.secpod.oval:def:43186 The host is missing a moderate severity security update KB4054520 oval:org.secpod.oval:def:43195 The host is missing an important security update KB4054519 oval:org.secpod.oval:def:43194 The host is missing an important security update 4054518 oval:org.secpod.oval:def:44647 The host is missing an important security update for KB4088875 oval:org.secpod.oval:def:44649 The host is missing an important security update for KB4088878 oval:org.secpod.oval:def:44650 The host is missing an important security update for KB4088879 oval:org.secpod.oval:def:44651 The host is missing an important security update for KB4088876 oval:org.secpod.oval:def:44652 The host is missing an important security update for KB4088877 oval:org.secpod.oval:def:44656 The host is missing an important security update for KB4088880 oval:org.secpod.oval:def:44999 The host is missing a critical security update for KB4093114 oval:org.secpod.oval:def:44638 The host is missing an important security update for KB4056564 oval:org.secpod.oval:def:44997 The host is missing an important security update for KB4093257 oval:org.secpod.oval:def:44998 The host is missing a critical security update for 4093115 oval:org.secpod.oval:def:43185 The host is missing an important security update 4054521 oval:org.secpod.oval:def:45003 The host is missing an important security update for KB4091756 oval:org.secpod.oval:def:43184 The host is missing a security update 4053473 oval:org.secpod.oval:def:43188 The host is missing an important security update 4054522 oval:org.secpod.oval:def:43187 The host is missing an important security update 4054523 oval:org.secpod.oval:def:45007 The host is missing an important security update for KB4093227 oval:org.secpod.oval:def:45008 The host is missing a critical security update for KB4093108 oval:org.secpod.oval:def:45009 The host is missing a critical security update for KB4093118 oval:org.secpod.oval:def:45013 The host is missing a critical security update for KB4093122 oval:org.secpod.oval:def:45014 The host is missing a critical security update for KB4093123 oval:org.secpod.oval:def:45010 The host is missing a moderate severity security update for KB4093224 oval:org.secpod.oval:def:45011 The host is missing a critical security update for KB4093223 oval:org.secpod.oval:def:45012 The host is missing a moderate severity security update for KB4092946 oval:org.secpod.oval:def:45415 The host is missing a critical security update for KB4094079 oval:org.secpod.oval:def:45439 The host is missing an important security update for KB4130944 oval:org.secpod.oval:def:45442 The host is missing an important security update for KB4101477 oval:org.secpod.oval:def:46048 The host is missing a critical security update 4284846 oval:org.secpod.oval:def:46049 The host is missing a critical security update for KB4284855 oval:org.secpod.oval:def:46044 The host is missing an important security update for KB4284815 oval:org.secpod.oval:def:46043 The host is missing an important security update for KB4234459 oval:org.secpod.oval:def:46046 The host is missing an important security update for KB4284826 oval:org.secpod.oval:def:46051 The host is missing a critical security update 4284867 oval:org.secpod.oval:def:46053 The host is missing a critical security update 4284878 oval:org.secpod.oval:def:46383 The host is missing an important security update for KB4291391 oval:org.secpod.oval:def:46385 The host is missing an important security update for KB4295656 oval:org.secpod.oval:def:46384 The host is missing an important security update for KB4293756 oval:org.secpod.oval:def:46408 The host is missing an important security update for KB4338818 oval:org.secpod.oval:def:46407 The host is missing an important security update for KB4338815 oval:org.secpod.oval:def:46411 The host is missing an important security update for KB4338823 oval:org.secpod.oval:def:46410 The host is missing an important security update for KB4338820 oval:org.secpod.oval:def:46412 The host is an important security update for KB4338824 oval:org.secpod.oval:def:46418 The host is missing an important security update for KB4339291 oval:org.secpod.oval:def:46416 The host is missing an important security update for KB4338830 oval:org.secpod.oval:def:46421 The host is missing an important security update for KB4340583 oval:org.secpod.oval:def:46420 The host is missing an important security update for KB4339854 oval:org.secpod.oval:def:47161 The host is missing an important security update for KB4343674 oval:org.secpod.oval:def:47164 The host is missing an important security update for KB4343888 oval:org.secpod.oval:def:47169 The host is missing an important security update for KB4343899 oval:org.secpod.oval:def:47166 The host is missing an security update for KB4343896 oval:org.secpod.oval:def:47168 The host is missing an important security update for KB4343898 oval:org.secpod.oval:def:47173 The host is missing a critical security update for KB4344104 oval:org.secpod.oval:def:47171 The host is missing an important security update for KB4343901 oval:org.secpod.oval:def:47170 The host is missing an important security update for KB4343900 oval:org.secpod.oval:def:47158 The host is missing an important security update for KB4340937 oval:org.secpod.oval:def:47157 The host is missing an important security update for KB4338380 oval:org.secpod.oval:def:47489 The host is missing a critical security update for KB4457129 oval:org.secpod.oval:def:47488 The host is missing a critical security update 4457145 oval:org.secpod.oval:def:47485 The host is missing a critical security update 4457143 oval:org.secpod.oval:def:47487 The host is missing a critical security update for KB4457144 oval:org.secpod.oval:def:47486 The host is missing a critical security update 4457140 oval:org.secpod.oval:def:47492 The host is missing a critical security update 4457984 oval:org.secpod.oval:def:47491 The host is missing a critical security update for KB4458010 oval:org.secpod.oval:def:47493 The host is missing a critical security update for KB4457135 oval:org.secpod.oval:def:47931 The host is missing a critical security update for KB4463097 oval:org.secpod.oval:def:47938 The host is missing a critical security update for KB4462923 oval:org.secpod.oval:def:47933 The host is missing a critical security update for KB4462915 oval:org.secpod.oval:def:47932 The host is missing a critical security update for KB4463104 oval:org.secpod.oval:def:47940 The host is missing a critical security update for KB4462929 oval:org.secpod.oval:def:47941 The host is missing a critical security update for KB4462931 oval:org.secpod.oval:def:50130 The host is missing an important security update for KB4480960 oval:org.secpod.oval:def:50129 The host is missing an important security update for KB4480957 oval:org.secpod.oval:def:50140 The host is missing an important security update for KB4480975 oval:org.secpod.oval:def:50133 The host is missing an important security update for KB4480963 oval:org.secpod.oval:def:50134 The host is missing an important security update for KB4480964 oval:org.secpod.oval:def:50136 The host is missing an important security update for KB4480968 oval:org.secpod.oval:def:50137 The host is missing an important security update for KB4480970 oval:org.secpod.oval:def:50138 The host is missing an important security update for KB4480972 oval:org.secpod.oval:def:39418 A remote code execution vulnerability exists in Windows when the iSNS Server service fails to properly validate input from the client, leading to an integer overflow. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SYSTEM account.An attacker co ... oval:org.secpod.oval:def:51415 The host is missing an critical security update for KB4489878 oval:org.secpod.oval:def:51417 The host is missing an critical security update for KB4489883 oval:org.secpod.oval:def:51416 The host is missing an critical security update for KB4489885 oval:org.secpod.oval:def:51419 The host is missing an critical security update for KB4489876 oval:org.secpod.oval:def:51420 The host is missing an critical security update for KB4489880 oval:org.secpod.oval:def:51422 The host is missing an critical security update for KB4489884 oval:org.secpod.oval:def:51421 The host is missing an critical security update for KB4489891 oval:org.secpod.oval:def:43182 The host is missing a critical security update KB4054517 oval:org.secpod.oval:def:45004 The host is missing an important security update for KB4093109 oval:org.secpod.oval:def:45001 The host is missing a critical security update for KB4093112 oval:org.secpod.oval:def:45006 The host is missing an important security update for KB4093107 oval:org.secpod.oval:def:43192 The host is missing an important security update KB4053580 oval:org.secpod.oval:def:43190 The host is missing an important security update KB4053578 oval:org.secpod.oval:def:44648 The host is missing an important security update for KB4088779 oval:org.secpod.oval:def:44645 The host is missing an important security update for KB4088782 oval:org.secpod.oval:def:44653 The host is missing an important security update for KB4088776 oval:org.secpod.oval:def:47162 The host is missing an important security update for KB4343885 oval:org.secpod.oval:def:47167 The host is missing an important security update for KB4343897 oval:org.secpod.oval:def:47172 The host is missing an important security update for KB4343909 oval:org.secpod.oval:def:47484 The host is missing an important security update for KB4457142 oval:org.secpod.oval:def:46047 The host is missing an important security update for KB4284835 oval:org.secpod.oval:def:46045 The host is missing an important security update for KB4284819 oval:org.secpod.oval:def:46052 The host is missing a critical security update for KB4284874 oval:org.secpod.oval:def:46409 The host is missing an important security update for KB4338819 oval:org.secpod.oval:def:46413 The host is missing an important security update for KB4338825 oval:org.secpod.oval:def:46414 The host is missing an important security update for KB4338826 oval:org.secpod.oval:def:50141 The host is missing an important security update for KB4480978 oval:org.secpod.oval:def:49153 The host is missing an important security update for KB4467696 oval:org.secpod.oval:def:50135 The host is missing an important security update for KB4480966 oval:org.secpod.oval:def:49151 The host is missing an important security update for KB4467686 oval:org.secpod.oval:def:50139 The host is missing an important security update for KB4480973 oval:org.secpod.oval:def:49157 The host is missing a critical security update for KB4467702 oval:org.secpod.oval:def:51411 The host is missing an critical security update for KB4489871 oval:org.secpod.oval:def:51413 The host is missing an critical security update for KB4489868 oval:org.secpod.oval:def:51412 The host is missing an critical security update for KB4489886 oval:org.secpod.oval:def:51418 The host is missing an critical security update for KB4489881 oval:org.secpod.oval:def:47495 The host is missing a critical security update for KB4457138 oval:org.secpod.oval:def:49748 The host is missing an important security update for KB4471324 oval:org.secpod.oval:def:49753 The host is missing an important security update for KB4471329 oval:org.secpod.oval:def:49751 The host is missing an important security update for KB4471327 oval:org.secpod.oval:def:50745 The host is missing an important security update for KB4486996 oval:org.secpod.oval:def:50747 The host is missing an important security update for KB4487017 oval:org.secpod.oval:def:50750 The host is missing an important security update for KB4487020 oval:org.secpod.oval:def:47516 The host is missing a critical security update for KB4457128 oval:org.secpod.oval:def:54201 The host is missing an important security update for KB4493474 oval:org.secpod.oval:def:54751 The host is missing an important security update for KB4499179 oval:org.secpod.oval:def:54748 The host is missing an important security update for KB4499167 oval:org.secpod.oval:def:54753 The host is missing an important security update for KB4499181 oval:org.secpod.oval:def:54190 The host is missing an important security update for KB4493441 oval:org.secpod.oval:def:54196 The host is missing an important security update for KB4493464 oval:org.secpod.oval:def:43193 The host is missing an important security update KB4053581 oval:org.secpod.oval:def:44641 The host is missing an important security update for KB4088786 oval:org.secpod.oval:def:46050 The host is missing a critical security update for KB4284860 oval:org.secpod.oval:def:45000 The host is missing a critical security update for KB4093111 oval:org.secpod.oval:def:46415 The host is missing an important security update for KB4338829 oval:org.secpod.oval:def:49150 The host is missing an important security update for KB4467680 oval:org.secpod.oval:def:47165 The host is missing an important security update for KB4343892 oval:org.secpod.oval:def:47490 The host is missing a critical security update for KB4457132 oval:org.secpod.oval:def:50132 The host is missing an important security update for KB4480962 oval:org.secpod.oval:def:49747 The host is missing an important security update for KB4471323 oval:org.secpod.oval:def:51410 The host is missing an critical security update for KB4489872 oval:org.secpod.oval:def:50748 The host is missing an important security update for KB4487018 oval:org.secpod.oval:def:54744 The host is missing an important security update for KB4499154 oval:org.secpod.oval:def:54202 The host is missing an important security update for KB4493475 oval:org.secpod.oval:def:40495 The host is missing an important security update KB4019472 oval:org.secpod.oval:def:39421 The host is missing a critical security update according to Microsoft security bulletin, MS17-012. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute a ... oval:org.secpod.oval:def:40934 The host is missing an important security update KB4022715 oval:org.secpod.oval:def:42355 The host is missing a critical security update KB4041691 oval:org.secpod.oval:def:42751 The host is missing an important security update KB4048953 oval:org.secpod.oval:def:43168 An information disclosure vulnerability exists when the Windows its:// protocol handler unnecessarily sends traffic to a remote site in order to determine the zone of a provided URL. This could potentially result in the disclosure of sensitive information to a malicious site. To exploit the vulnera ... oval:org.secpod.oval:def:44644 The host is missing an important security update for KB4088787 oval:org.secpod.oval:def:44986 A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding. To e ... oval:org.secpod.oval:def:44987 A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or dele ... oval:org.secpod.oval:def:46367 A denial of service vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to properly handle DNS responses. An attacker who successfully exploited the vulnerability could cause a system to stop responding. Note that the denial of service condition would not allow an attac ... oval:org.secpod.oval:def:46366 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delet ... oval:org.secpod.oval:def:46369 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new a ... oval:org.secpod.oval:def:46368 A security feature bypass vulnerability exists when Microsoft WordPad improperly handles embedded OLE objects. An attacker who successfully exploited the vulnerability could bypass content blocking. In a file-sharing attack scenario, an attacker could provide a specially crafted document file desig ... oval:org.secpod.oval:def:46365 A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integr ... oval:org.secpod.oval:def:46364 A denial of service vulnerability exists when Windows improperly handles File Transfer Protocol (FTP) connections. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit the vulnerability, an unauthenticated attacker could send specially ... oval:org.secpod.oval:def:46370 A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specia ... oval:org.secpod.oval:def:46371 An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. To exploit the vulnerability, a ... oval:org.secpod.oval:def:49098 A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full use ... oval:org.secpod.oval:def:49095 An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to ... oval:org.secpod.oval:def:47128 An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then inst ... oval:org.secpod.oval:def:47127 A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects. An attacker who successfully exploited the vulnerability could use a specially crafted file or script to perform actions. In an email attack scenario, an attack ... oval:org.secpod.oval:def:47129 A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; o ... oval:org.secpod.oval:def:47494 The host is missing a critical security update for KB4457131 oval:org.secpod.oval:def:47132 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ... oval:org.secpod.oval:def:47141 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ... oval:org.secpod.oval:def:47148 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or ... oval:org.secpod.oval:def:47147 An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to ... oval:org.secpod.oval:def:47149 An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to ... oval:org.secpod.oval:def:47144 An elevation of privilege vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle parsing of certain symbolic links. An attacker who successfully exploited this vulnerability could potentially access privileged registry keys and thereby elevate permissions. An atta ... oval:org.secpod.oval:def:47143 An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it. To exploit the vulnerability, in a local attack scenario, an attacker could run a specially crafted application to e ... oval:org.secpod.oval:def:47150 An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to ... oval:org.secpod.oval:def:47451 An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, ... oval:org.secpod.oval:def:47460 An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to l ... oval:org.secpod.oval:def:47915 A remote code execution vulnerability exists when Windows Shell improperly handles URIs. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of a ... oval:org.secpod.oval:def:50131 The host is missing an important security update for KB4480961 oval:org.secpod.oval:def:49152 The host is missing an important security update for KB4467691 oval:org.secpod.oval:def:49745 The host is missing an important security update for KB4471321 oval:org.secpod.oval:def:51423 The host is missing an critical security update for KB4489882 oval:org.secpod.oval:def:50961 An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to f ... oval:org.secpod.oval:def:50728 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or ... oval:org.secpod.oval:def:50753 The host is missing an important security update for KB4487026 oval:org.secpod.oval:def:54198 The host is missing an important security update for KB4493470 oval:org.secpod.oval:def:54740 The host is missing an important security update for KB4494440 oval:org.secpod.oval:def:44619 A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP). An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute code on the target system. CredSSP is an authentication provider which processe ... oval:org.secpod.oval:def:50071 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ... oval:org.secpod.oval:def:50072 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50073 An elevation of privilege vulnerability exists when Windows improperly handles authentication requests. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the ... oval:org.secpod.oval:def:47904 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or ... oval:org.secpod.oval:def:47903 A remote code execution vulnerability exists in the Microsoft JET Database Engine. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. ... oval:org.secpod.oval:def:47906 An information disclosure vulnerability exists when Windows Media Player improperly discloses file information. Successful exploitation of the vulnerability could allow an attacker to determine the presence of files on disk. To exploit the vulnerability, a user would have to open a specially crafte ... oval:org.secpod.oval:def:47905 An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could ... oval:org.secpod.oval:def:47900 An Elevation of Privilege vulnerability exists in Filter Manager when it improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute elevated code and take control of an affected system. An attacker could then install programs; view, change, or delet ... oval:org.secpod.oval:def:47902 A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, ... oval:org.secpod.oval:def:47901 An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially craft ... oval:org.secpod.oval:def:47908 An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to ... oval:org.secpod.oval:def:47907 An information disclosure vulnerability exists when Windows Media Player improperly discloses file information. Successful exploitation of the vulnerability could allow an attacker to determine the presence of files on disk. To exploit the vulnerability, a user would have to open a specially crafte ... oval:org.secpod.oval:def:47909 An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by running a specia ... oval:org.secpod.oval:def:49097 A security feature bypass vulnerability exists in Microsoft JScript that could allow an attacker to bypass Device Guard. To exploit the vulnerability, an attacker would first have to access the local machine, and run a specially crafted application to create arbitrary COM objects. The update addre ... oval:org.secpod.oval:def:49096 A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code. To exploit this vulnerability, an attacker would need to log on to the affected system and run a specially crafted application. The security update addresses the vulnerability by correcting log mana ... oval:org.secpod.oval:def:49093 A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system. To exploit the vulnerability, an attacker must send a specially crafted file to a vu ... oval:org.secpod.oval:def:49094 An information disclosure vulnerability exists when Kernel Remote Procedure Call Provider driver improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability co ... oval:org.secpod.oval:def:49100 An elevation of privilege vulnerability exists in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated a ... oval:org.secpod.oval:def:49102 An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full ... oval:org.secpod.oval:def:49691 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ... oval:org.secpod.oval:def:49692 An information disclosure vulnerability exists when Remote Procedure Call runtime improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain infor ... oval:org.secpod.oval:def:49695 An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. An attacker with unprivileged access to a vulnerable system co ... oval:org.secpod.oval:def:49755 The host is missing an important security update for KB4471332 oval:org.secpod.oval:def:49705 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delet ... oval:org.secpod.oval:def:47914 A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the users system. To exploit the vulnerability, an attacker could host a ... oval:org.secpod.oval:def:47916 An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially cr ... oval:org.secpod.oval:def:47911 A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause ... oval:org.secpod.oval:def:47910 A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause ... oval:org.secpod.oval:def:47912 A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integr ... oval:org.secpod.oval:def:47930 The host is missing a moderate severity security update for KB4464330 oval:org.secpod.oval:def:50075 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ... oval:org.secpod.oval:def:50080 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ... oval:org.secpod.oval:def:50081 An elevation of privilege vulnerability exists in the Microsoft XmlDocument class that could allow an attacker to escape from the AppContainer sandbox in the browser. An attacker who successfully exploited this vulnerability could gain elevated privileges and break out of the Edge AppContainer sandb ... oval:org.secpod.oval:def:50082 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by runnin ... oval:org.secpod.oval:def:50083 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted applica ... oval:org.secpod.oval:def:50084 An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted a ... oval:org.secpod.oval:def:50085 An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted a ... oval:org.secpod.oval:def:50086 An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted a ... oval:org.secpod.oval:def:50087 An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted a ... oval:org.secpod.oval:def:50077 A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause ... oval:org.secpod.oval:def:50078 An elevation of privilege exists in Windows COM Desktop Broker. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This v ... oval:org.secpod.oval:def:50128 The host is missing an important security update for KB4480116 oval:org.secpod.oval:def:51374 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit ... oval:org.secpod.oval:def:51373 A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attac ... oval:org.secpod.oval:def:50720 An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victims system. To exploit the vulnerability, an attacker ... oval:org.secpod.oval:def:50721 An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victims system. To exploit the vulnerability, an attacker ... oval:org.secpod.oval:def:50722 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ... oval:org.secpod.oval:def:50723 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ... oval:org.secpod.oval:def:50724 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ... oval:org.secpod.oval:def:50725 A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delet ... oval:org.secpod.oval:def:50726 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ... oval:org.secpod.oval:def:50727 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ... oval:org.secpod.oval:def:50729 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50730 A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first ha ... oval:org.secpod.oval:def:50731 An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on t ... oval:org.secpod.oval:def:50732 A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first ha ... oval:org.secpod.oval:def:50733 A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first ha ... oval:org.secpod.oval:def:50734 An information vulnerability exists when Windows improperly discloses file information. Successful exploitation of the vulnerability could allow the attacker to read the contents of files on disk. To exploit the vulnerability, an attacker would have to log onto an affected system and run a specially ... oval:org.secpod.oval:def:50736 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new a ... oval:org.secpod.oval:def:50737 An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on t ... oval:org.secpod.oval:def:50738 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ... oval:org.secpod.oval:def:50740 A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delet ... oval:org.secpod.oval:def:50755 The host is missing an important security update for KB4487044 oval:org.secpod.oval:def:50711 A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability, in most sit ... oval:org.secpod.oval:def:50712 A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability, in most si ... oval:org.secpod.oval:def:50713 A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. To exploit the vulnerability, an attacker could send a ... oval:org.secpod.oval:def:50714 An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that ... oval:org.secpod.oval:def:50715 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50716 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50717 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50718 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50719 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50090 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50091 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50092 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50093 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50094 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50095 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50096 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50097 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50088 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:50089 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ... oval:org.secpod.oval:def:51383 A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machi ... oval:org.secpod.oval:def:51384 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new a ... oval:org.secpod.oval:def:51375 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to ope ... oval:org.secpod.oval:def:51379 A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerab ... oval:org.secpod.oval:def:51390 An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerabil ... oval:org.secpod.oval:def:51392 A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specia ... oval:org.secpod.oval:def:51394 A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the users system. To exploit the vulnerability, an attacker could host a ... oval:org.secpod.oval:def:51393 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ... oval:org.secpod.oval:def:51396 A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could g ... oval:org.secpod.oval:def:51395 An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory. An attacker who successfully exploited this vulnerability could use the information to further exploit the victim system. To exploit this vulnerability, an attacker would have t ... oval:org.secpod.oval:def:51389 An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerabil ... oval:org.secpod.oval:def:51388 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ... oval:org.secpod.oval:def:51398 An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to ... oval:org.secpod.oval:def:51397 An elevation of privilege vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vu ... oval:org.secpod.oval:def:51399 A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability ... oval:org.secpod.oval:def:51414 The host is missing an critical security update for KB4489899 oval:org.secpod.oval:def:51400 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit ... oval:org.secpod.oval:def:51402 An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. To exploit the vulnerability, an attacker would have to either l ... oval:org.secpod.oval:def:51401 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ... oval:org.secpod.oval:def:51404 A remote code execution vulnerability exists in the way that the ActiveX Data objects (ADO) handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vul ... oval:org.secpod.oval:def:51403 An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to l ... oval:org.secpod.oval:def:51405 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or ... oval:org.secpod.oval:def:51407 An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerabil ... oval:org.secpod.oval:def:54171 An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, ... oval:org.secpod.oval:def:54174 An information disclosure vulnerability exists when the Terminal Services component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a users system.To exploit this vulnerability, an attacker would ... oval:org.secpod.oval:def:54173 An information disclosure vulnerability exists when Windows Task Scheduler improperly discloses credentials to Windows Credential Manager. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. An attacker could then install programs ... oval:org.secpod.oval:def:54728 A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delet ... oval:org.secpod.oval:def:54741 The host is missing an important security update for KB4494441 oval:org.secpod.oval:def:54203 The host is missing an important security update for KB4493509 oval:org.secpod.oval:def:47937 The host is missing a critical security update for KB4462922 oval:org.secpod.oval:def:47936 The host is missing a critical security update for KB4462919 oval:org.secpod.oval:def:47939 The host is missing a critical security update for KB4462926 oval:org.secpod.oval:def:47935 The host is missing a critical security update for KB4462918 oval:org.secpod.oval:def:47934 The host is missing a critical security update for KB4462917 oval:org.secpod.oval:def:47942 The host is missing a critical security update for KB4462937 oval:org.secpod.oval:def:47943 The host is missing a critical security update for KB4462941 oval:org.secpod.oval:def:43427 The host is missing a critical security update 4056890 oval:org.secpod.oval:def:45418 The host is missing an important security update for KB4103731 oval:org.secpod.oval:def:45419 The host is missing an important security update for KB4103730 oval:org.secpod.oval:def:45416 The host is missing an important security update for KB4134651 oval:org.secpod.oval:def:45421 The host is missing an important security update 4103715 oval:org.secpod.oval:def:45543 The host is missing an important security update 4103718 oval:org.secpod.oval:def:45422 The host is missing an important security update for KB4103716 oval:org.secpod.oval:def:45423 The host is missing an important security update for KB4103721 oval:org.secpod.oval:def:45435 The host is missing an important security update for KB4103723 oval:org.secpod.oval:def:45436 The host is missing an important security update for KB4103725 oval:org.secpod.oval:def:45437 The host is missing an important security update 4103726 oval:org.secpod.oval:def:45438 The host is missing an important security update for KB4103727 oval:org.secpod.oval:def:45440 The host is missing an important security update 4103712 |