[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:49149
The host is missing an important security update for KB4467678

oval:org.secpod.oval:def:49147
The host is missing an important security update for KB4467106

oval:org.secpod.oval:def:49155
The host is missing an important security update for KB4467700

oval:org.secpod.oval:def:49158
The host is missing an important security update for KB4467703

oval:org.secpod.oval:def:49159
The host is missing an important security update for KB4467706

oval:org.secpod.oval:def:49156
The host is missing an important security update for KB4467701

oval:org.secpod.oval:def:49746
The host is missing an important security update for KB4471322

oval:org.secpod.oval:def:49743
The host is missing an important security update for KB4471319

oval:org.secpod.oval:def:49749
The host is missing an important security update for KB4471325

oval:org.secpod.oval:def:49754
The host is missing an important security update for KB4471330

oval:org.secpod.oval:def:49752
The host is missing an important security update for KB4471328

oval:org.secpod.oval:def:49750
The host is missing an important security update for KB4471326

oval:org.secpod.oval:def:45434
The host is missing an important security update for KB4131188

oval:org.secpod.oval:def:49148
The host is missing an important security update for KB4467107

oval:org.secpod.oval:def:49154
The host is missing an important security update for KB4467697

oval:org.secpod.oval:def:47159
The host is missing a critical security update for KB4340939

oval:org.secpod.oval:def:49744
The host is missing a critical security update for KB4471320

oval:org.secpod.oval:def:49742
The host is missing a critical security update for KB4471318

oval:org.secpod.oval:def:50742
The host is missing an important security update for KB4486563

oval:org.secpod.oval:def:50743
The host is missing an important security update for KB4486564

oval:org.secpod.oval:def:50744
The host is missing an important security update for KB4486993

oval:org.secpod.oval:def:50746
The host is missing an important security update for KB4487000

oval:org.secpod.oval:def:50749
The host is missing an important security update for KB4487019

oval:org.secpod.oval:def:50751
The host is missing an important security update for KB4487023

oval:org.secpod.oval:def:50752
The host is missing an important security update for KB4487025

oval:org.secpod.oval:def:50754
The host is missing an important security update for KB4487028

oval:org.secpod.oval:def:49101
A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attac ...

oval:org.secpod.oval:def:54704
A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially crafted packets. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server.To exploit the vulnerability, a remote unauthenticated attacker could send a spe ...

oval:org.secpod.oval:def:54750
The host is missing an important security update 4499175

oval:org.secpod.oval:def:54743
The host is missing an important security update for KB4499151

oval:org.secpod.oval:def:54742
The host is missing an important security update for KB4499149

oval:org.secpod.oval:def:54747
The host is missing an important security update 4499165

oval:org.secpod.oval:def:54745
The host is missing an important security update 4499158

oval:org.secpod.oval:def:54746
The host is missing an important security update for KB4499164

oval:org.secpod.oval:def:54749
The host is missing an important security update for KB4499171

oval:org.secpod.oval:def:54752
The host is missing an important security update 4499180

oval:org.secpod.oval:def:54200
The host is missing an important security update for KB4493472

oval:org.secpod.oval:def:54192
The host is missing an important security update for KB4493448

oval:org.secpod.oval:def:54193
The host is missing an important security update for KB4493450

oval:org.secpod.oval:def:54191
The host is missing an important security update for KB4493446

oval:org.secpod.oval:def:54197
The host is missing an important security update for KB4493467

oval:org.secpod.oval:def:54194
The host is missing an important security update for KB4493451

oval:org.secpod.oval:def:54195
The host is missing an important security update for KB4493458

oval:org.secpod.oval:def:54199
The host is missing an important security update for KB4493471

oval:org.secpod.oval:def:43186
The host is missing a moderate severity security update KB4054520

oval:org.secpod.oval:def:43195
The host is missing an important security update KB4054519

oval:org.secpod.oval:def:43194
The host is missing an important security update 4054518

oval:org.secpod.oval:def:44647
The host is missing an important security update for KB4088875

oval:org.secpod.oval:def:44649
The host is missing an important security update for KB4088878

oval:org.secpod.oval:def:44650
The host is missing an important security update for KB4088879

oval:org.secpod.oval:def:44651
The host is missing an important security update for KB4088876

oval:org.secpod.oval:def:44652
The host is missing an important security update for KB4088877

oval:org.secpod.oval:def:44656
The host is missing an important security update for KB4088880

oval:org.secpod.oval:def:44999
The host is missing a critical security update for KB4093114

oval:org.secpod.oval:def:44638
The host is missing an important security update for KB4056564

oval:org.secpod.oval:def:44997
The host is missing an important security update for KB4093257

oval:org.secpod.oval:def:44998
The host is missing a critical security update for 4093115

oval:org.secpod.oval:def:43185
The host is missing an important security update 4054521

oval:org.secpod.oval:def:45003
The host is missing an important security update for KB4091756

oval:org.secpod.oval:def:43184
The host is missing a security update 4053473

oval:org.secpod.oval:def:43188
The host is missing an important security update 4054522

oval:org.secpod.oval:def:43187
The host is missing an important security update 4054523

oval:org.secpod.oval:def:45007
The host is missing an important security update for KB4093227

oval:org.secpod.oval:def:45008
The host is missing a critical security update for KB4093108

oval:org.secpod.oval:def:45009
The host is missing a critical security update for KB4093118

oval:org.secpod.oval:def:45013
The host is missing a critical security update for KB4093122

oval:org.secpod.oval:def:45014
The host is missing a critical security update for KB4093123

oval:org.secpod.oval:def:45010
The host is missing a moderate severity security update for KB4093224

oval:org.secpod.oval:def:45011
The host is missing a critical security update for KB4093223

oval:org.secpod.oval:def:45012
The host is missing a moderate severity security update for KB4092946

oval:org.secpod.oval:def:45415
The host is missing a critical security update for KB4094079

oval:org.secpod.oval:def:45439
The host is missing an important security update for KB4130944

oval:org.secpod.oval:def:45442
The host is missing an important security update for KB4101477

oval:org.secpod.oval:def:46048
The host is missing a critical security update 4284846

oval:org.secpod.oval:def:46049
The host is missing a critical security update for KB4284855

oval:org.secpod.oval:def:46044
The host is missing an important security update for KB4284815

oval:org.secpod.oval:def:46043
The host is missing an important security update for KB4234459

oval:org.secpod.oval:def:46046
The host is missing an important security update for KB4284826

oval:org.secpod.oval:def:46051
The host is missing a critical security update 4284867

oval:org.secpod.oval:def:46053
The host is missing a critical security update 4284878

oval:org.secpod.oval:def:46383
The host is missing an important security update for KB4291391

oval:org.secpod.oval:def:46385
The host is missing an important security update for KB4295656

oval:org.secpod.oval:def:46384
The host is missing an important security update for KB4293756

oval:org.secpod.oval:def:46408
The host is missing an important security update for KB4338818

oval:org.secpod.oval:def:46407
The host is missing an important security update for KB4338815

oval:org.secpod.oval:def:46411
The host is missing an important security update for KB4338823

oval:org.secpod.oval:def:46410
The host is missing an important security update for KB4338820

oval:org.secpod.oval:def:46412
The host is an important security update for KB4338824

oval:org.secpod.oval:def:46418
The host is missing an important security update for KB4339291

oval:org.secpod.oval:def:46416
The host is missing an important security update for KB4338830

oval:org.secpod.oval:def:46421
The host is missing an important security update for KB4340583

oval:org.secpod.oval:def:46420
The host is missing an important security update for KB4339854

oval:org.secpod.oval:def:47161
The host is missing an important security update for KB4343674

oval:org.secpod.oval:def:47164
The host is missing an important security update for KB4343888

oval:org.secpod.oval:def:47169
The host is missing an important security update for KB4343899

oval:org.secpod.oval:def:47166
The host is missing an security update for KB4343896

oval:org.secpod.oval:def:47168
The host is missing an important security update for KB4343898

oval:org.secpod.oval:def:47173
The host is missing a critical security update for KB4344104

oval:org.secpod.oval:def:47171
The host is missing an important security update for KB4343901

oval:org.secpod.oval:def:47170
The host is missing an important security update for KB4343900

oval:org.secpod.oval:def:47158
The host is missing an important security update for KB4340937

oval:org.secpod.oval:def:47157
The host is missing an important security update for KB4338380

oval:org.secpod.oval:def:47489
The host is missing a critical security update for KB4457129

oval:org.secpod.oval:def:47488
The host is missing a critical security update 4457145

oval:org.secpod.oval:def:47485
The host is missing a critical security update 4457143

oval:org.secpod.oval:def:47487
The host is missing a critical security update for KB4457144

oval:org.secpod.oval:def:47486
The host is missing a critical security update 4457140

oval:org.secpod.oval:def:47492
The host is missing a critical security update 4457984

oval:org.secpod.oval:def:47491
The host is missing a critical security update for KB4458010

oval:org.secpod.oval:def:47493
The host is missing a critical security update for KB4457135

oval:org.secpod.oval:def:47931
The host is missing a critical security update for KB4463097

oval:org.secpod.oval:def:47938
The host is missing a critical security update for KB4462923

oval:org.secpod.oval:def:47933
The host is missing a critical security update for KB4462915

oval:org.secpod.oval:def:47932
The host is missing a critical security update for KB4463104

oval:org.secpod.oval:def:47940
The host is missing a critical security update for KB4462929

oval:org.secpod.oval:def:47941
The host is missing a critical security update for KB4462931

oval:org.secpod.oval:def:50130
The host is missing an important security update for KB4480960

oval:org.secpod.oval:def:50129
The host is missing an important security update for KB4480957

oval:org.secpod.oval:def:50140
The host is missing an important security update for KB4480975

oval:org.secpod.oval:def:50133
The host is missing an important security update for KB4480963

oval:org.secpod.oval:def:50134
The host is missing an important security update for KB4480964

oval:org.secpod.oval:def:50136
The host is missing an important security update for KB4480968

oval:org.secpod.oval:def:50137
The host is missing an important security update for KB4480970

oval:org.secpod.oval:def:50138
The host is missing an important security update for KB4480972

oval:org.secpod.oval:def:39418
A remote code execution vulnerability exists in Windows when the iSNS Server service fails to properly validate input from the client, leading to an integer overflow. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SYSTEM account.An attacker co ...

oval:org.secpod.oval:def:51415
The host is missing an critical security update for KB4489878

oval:org.secpod.oval:def:51417
The host is missing an critical security update for KB4489883

oval:org.secpod.oval:def:51416
The host is missing an critical security update for KB4489885

oval:org.secpod.oval:def:51419
The host is missing an critical security update for KB4489876

oval:org.secpod.oval:def:51420
The host is missing an critical security update for KB4489880

oval:org.secpod.oval:def:51422
The host is missing an critical security update for KB4489884

oval:org.secpod.oval:def:51421
The host is missing an critical security update for KB4489891

oval:org.secpod.oval:def:43182
The host is missing a critical security update KB4054517

oval:org.secpod.oval:def:45004
The host is missing an important security update for KB4093109

oval:org.secpod.oval:def:45001
The host is missing a critical security update for KB4093112

oval:org.secpod.oval:def:45006
The host is missing an important security update for KB4093107

oval:org.secpod.oval:def:43192
The host is missing an important security update KB4053580

oval:org.secpod.oval:def:43190
The host is missing an important security update KB4053578

oval:org.secpod.oval:def:44648
The host is missing an important security update for KB4088779

oval:org.secpod.oval:def:44645
The host is missing an important security update for KB4088782

oval:org.secpod.oval:def:44653
The host is missing an important security update for KB4088776

oval:org.secpod.oval:def:47162
The host is missing an important security update for KB4343885

oval:org.secpod.oval:def:47167
The host is missing an important security update for KB4343897

oval:org.secpod.oval:def:47172
The host is missing an important security update for KB4343909

oval:org.secpod.oval:def:47484
The host is missing an important security update for KB4457142

oval:org.secpod.oval:def:46047
The host is missing an important security update for KB4284835

oval:org.secpod.oval:def:46045
The host is missing an important security update for KB4284819

oval:org.secpod.oval:def:46052
The host is missing a critical security update for KB4284874

oval:org.secpod.oval:def:46409
The host is missing an important security update for KB4338819

oval:org.secpod.oval:def:46413
The host is missing an important security update for KB4338825

oval:org.secpod.oval:def:46414
The host is missing an important security update for KB4338826

oval:org.secpod.oval:def:50141
The host is missing an important security update for KB4480978

oval:org.secpod.oval:def:49153
The host is missing an important security update for KB4467696

oval:org.secpod.oval:def:50135
The host is missing an important security update for KB4480966

oval:org.secpod.oval:def:49151
The host is missing an important security update for KB4467686

oval:org.secpod.oval:def:50139
The host is missing an important security update for KB4480973

oval:org.secpod.oval:def:49157
The host is missing a critical security update for KB4467702

oval:org.secpod.oval:def:51411
The host is missing an critical security update for KB4489871

oval:org.secpod.oval:def:51413
The host is missing an critical security update for KB4489868

oval:org.secpod.oval:def:51412
The host is missing an critical security update for KB4489886

oval:org.secpod.oval:def:51418
The host is missing an critical security update for KB4489881

oval:org.secpod.oval:def:47495
The host is missing a critical security update for KB4457138

oval:org.secpod.oval:def:49748
The host is missing an important security update for KB4471324

oval:org.secpod.oval:def:49753
The host is missing an important security update for KB4471329

oval:org.secpod.oval:def:49751
The host is missing an important security update for KB4471327

oval:org.secpod.oval:def:50745
The host is missing an important security update for KB4486996

oval:org.secpod.oval:def:50747
The host is missing an important security update for KB4487017

oval:org.secpod.oval:def:50750
The host is missing an important security update for KB4487020

oval:org.secpod.oval:def:47516
The host is missing a critical security update for KB4457128

oval:org.secpod.oval:def:54201
The host is missing an important security update for KB4493474

oval:org.secpod.oval:def:54751
The host is missing an important security update for KB4499179

oval:org.secpod.oval:def:54748
The host is missing an important security update for KB4499167

oval:org.secpod.oval:def:54753
The host is missing an important security update for KB4499181

oval:org.secpod.oval:def:54190
The host is missing an important security update for KB4493441

oval:org.secpod.oval:def:54196
The host is missing an important security update for KB4493464

oval:org.secpod.oval:def:43193
The host is missing an important security update KB4053581

oval:org.secpod.oval:def:44641
The host is missing an important security update for KB4088786

oval:org.secpod.oval:def:46050
The host is missing a critical security update for KB4284860

oval:org.secpod.oval:def:45000
The host is missing a critical security update for KB4093111

oval:org.secpod.oval:def:46415
The host is missing an important security update for KB4338829

oval:org.secpod.oval:def:49150
The host is missing an important security update for KB4467680

oval:org.secpod.oval:def:47165
The host is missing an important security update for KB4343892

oval:org.secpod.oval:def:47490
The host is missing a critical security update for KB4457132

oval:org.secpod.oval:def:50132
The host is missing an important security update for KB4480962

oval:org.secpod.oval:def:49747
The host is missing an important security update for KB4471323

oval:org.secpod.oval:def:51410
The host is missing an critical security update for KB4489872

oval:org.secpod.oval:def:50748
The host is missing an important security update for KB4487018

oval:org.secpod.oval:def:54744
The host is missing an important security update for KB4499154

oval:org.secpod.oval:def:54202
The host is missing an important security update for KB4493475

oval:org.secpod.oval:def:40495
The host is missing an important security update KB4019472

oval:org.secpod.oval:def:39421
The host is missing a critical security update according to Microsoft security bulletin, MS17-012. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute a ...

oval:org.secpod.oval:def:40934
The host is missing an important security update KB4022715

oval:org.secpod.oval:def:42355
The host is missing a critical security update KB4041691

oval:org.secpod.oval:def:42751
The host is missing an important security update KB4048953

oval:org.secpod.oval:def:43168
An information disclosure vulnerability exists when the Windows its:// protocol handler unnecessarily sends traffic to a remote site in order to determine the zone of a provided URL. This could potentially result in the disclosure of sensitive information to a malicious site. To exploit the vulnera ...

oval:org.secpod.oval:def:44644
The host is missing an important security update for KB4088787

oval:org.secpod.oval:def:44986
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding. To e ...

oval:org.secpod.oval:def:44987
A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or dele ...

oval:org.secpod.oval:def:46367
A denial of service vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to properly handle DNS responses. An attacker who successfully exploited the vulnerability could cause a system to stop responding. Note that the denial of service condition would not allow an attac ...

oval:org.secpod.oval:def:46366
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delet ...

oval:org.secpod.oval:def:46369
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new a ...

oval:org.secpod.oval:def:46368
A security feature bypass vulnerability exists when Microsoft WordPad improperly handles embedded OLE objects. An attacker who successfully exploited the vulnerability could bypass content blocking. In a file-sharing attack scenario, an attacker could provide a specially crafted document file desig ...

oval:org.secpod.oval:def:46365
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integr ...

oval:org.secpod.oval:def:46364
A denial of service vulnerability exists when Windows improperly handles File Transfer Protocol (FTP) connections. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit the vulnerability, an unauthenticated attacker could send specially ...

oval:org.secpod.oval:def:46370
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specia ...

oval:org.secpod.oval:def:46371
An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. To exploit the vulnerability, a ...

oval:org.secpod.oval:def:49098
A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full use ...

oval:org.secpod.oval:def:49095
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to ...

oval:org.secpod.oval:def:47128
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then inst ...

oval:org.secpod.oval:def:47127
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects. An attacker who successfully exploited the vulnerability could use a specially crafted file or script to perform actions. In an email attack scenario, an attack ...

oval:org.secpod.oval:def:47129
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; o ...

oval:org.secpod.oval:def:47494
The host is missing a critical security update for KB4457131

oval:org.secpod.oval:def:47132
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ...

oval:org.secpod.oval:def:47141
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ...

oval:org.secpod.oval:def:47148
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or ...

oval:org.secpod.oval:def:47147
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to ...

oval:org.secpod.oval:def:47149
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to ...

oval:org.secpod.oval:def:47144
An elevation of privilege vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle parsing of certain symbolic links. An attacker who successfully exploited this vulnerability could potentially access privileged registry keys and thereby elevate permissions. An atta ...

oval:org.secpod.oval:def:47143
An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it. To exploit the vulnerability, in a local attack scenario, an attacker could run a specially crafted application to e ...

oval:org.secpod.oval:def:47150
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to ...

oval:org.secpod.oval:def:47451
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, ...

oval:org.secpod.oval:def:47460
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to l ...

oval:org.secpod.oval:def:47915
A remote code execution vulnerability exists when Windows Shell improperly handles URIs. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of a ...

oval:org.secpod.oval:def:50131
The host is missing an important security update for KB4480961

oval:org.secpod.oval:def:49152
The host is missing an important security update for KB4467691

oval:org.secpod.oval:def:49745
The host is missing an important security update for KB4471321

oval:org.secpod.oval:def:51423
The host is missing an critical security update for KB4489882

oval:org.secpod.oval:def:50961
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to f ...

oval:org.secpod.oval:def:50728
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or ...

oval:org.secpod.oval:def:50753
The host is missing an important security update for KB4487026

oval:org.secpod.oval:def:54198
The host is missing an important security update for KB4493470

oval:org.secpod.oval:def:54740
The host is missing an important security update for KB4494440

oval:org.secpod.oval:def:44619
A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP). An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute code on the target system. CredSSP is an authentication provider which processe ...

oval:org.secpod.oval:def:50071
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ...

oval:org.secpod.oval:def:50072
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50073
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the ...

oval:org.secpod.oval:def:47904
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or ...

oval:org.secpod.oval:def:47903
A remote code execution vulnerability exists in the Microsoft JET Database Engine. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. ...

oval:org.secpod.oval:def:47906
An information disclosure vulnerability exists when Windows Media Player improperly discloses file information. Successful exploitation of the vulnerability could allow an attacker to determine the presence of files on disk. To exploit the vulnerability, a user would have to open a specially crafte ...

oval:org.secpod.oval:def:47905
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could ...

oval:org.secpod.oval:def:47900
An Elevation of Privilege vulnerability exists in Filter Manager when it improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute elevated code and take control of an affected system. An attacker could then install programs; view, change, or delet ...

oval:org.secpod.oval:def:47902
A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, ...

oval:org.secpod.oval:def:47901
An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially craft ...

oval:org.secpod.oval:def:47908
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to ...

oval:org.secpod.oval:def:47907
An information disclosure vulnerability exists when Windows Media Player improperly discloses file information. Successful exploitation of the vulnerability could allow an attacker to determine the presence of files on disk. To exploit the vulnerability, a user would have to open a specially crafte ...

oval:org.secpod.oval:def:47909
An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by running a specia ...

oval:org.secpod.oval:def:49097
A security feature bypass vulnerability exists in Microsoft JScript that could allow an attacker to bypass Device Guard. To exploit the vulnerability, an attacker would first have to access the local machine, and run a specially crafted application to create arbitrary COM objects. The update addre ...

oval:org.secpod.oval:def:49096
A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code. To exploit this vulnerability, an attacker would need to log on to the affected system and run a specially crafted application. The security update addresses the vulnerability by correcting log mana ...

oval:org.secpod.oval:def:49093
A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system. To exploit the vulnerability, an attacker must send a specially crafted file to a vu ...

oval:org.secpod.oval:def:49094
An information disclosure vulnerability exists when Kernel Remote Procedure Call Provider driver improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability co ...

oval:org.secpod.oval:def:49100
An elevation of privilege vulnerability exists in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated a ...

oval:org.secpod.oval:def:49102
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full ...

oval:org.secpod.oval:def:49691
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ...

oval:org.secpod.oval:def:49692
An information disclosure vulnerability exists when Remote Procedure Call runtime improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain infor ...

oval:org.secpod.oval:def:49695
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. An attacker with unprivileged access to a vulnerable system co ...

oval:org.secpod.oval:def:49755
The host is missing an important security update for KB4471332

oval:org.secpod.oval:def:49705
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delet ...

oval:org.secpod.oval:def:47914
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the users system. To exploit the vulnerability, an attacker could host a ...

oval:org.secpod.oval:def:47916
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially cr ...

oval:org.secpod.oval:def:47911
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause ...

oval:org.secpod.oval:def:47910
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause ...

oval:org.secpod.oval:def:47912
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integr ...

oval:org.secpod.oval:def:47930
The host is missing a moderate severity security update for KB4464330

oval:org.secpod.oval:def:50075
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ...

oval:org.secpod.oval:def:50080
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ...

oval:org.secpod.oval:def:50081
An elevation of privilege vulnerability exists in the Microsoft XmlDocument class that could allow an attacker to escape from the AppContainer sandbox in the browser. An attacker who successfully exploited this vulnerability could gain elevated privileges and break out of the Edge AppContainer sandb ...

oval:org.secpod.oval:def:50082
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by runnin ...

oval:org.secpod.oval:def:50083
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted applica ...

oval:org.secpod.oval:def:50084
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted a ...

oval:org.secpod.oval:def:50085
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted a ...

oval:org.secpod.oval:def:50086
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted a ...

oval:org.secpod.oval:def:50087
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted a ...

oval:org.secpod.oval:def:50077
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause ...

oval:org.secpod.oval:def:50078
An elevation of privilege exists in Windows COM Desktop Broker. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This v ...

oval:org.secpod.oval:def:50128
The host is missing an important security update for KB4480116

oval:org.secpod.oval:def:51374
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit ...

oval:org.secpod.oval:def:51373
A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attac ...

oval:org.secpod.oval:def:50720
An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victims system. To exploit the vulnerability, an attacker ...

oval:org.secpod.oval:def:50721
An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victims system. To exploit the vulnerability, an attacker ...

oval:org.secpod.oval:def:50722
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ...

oval:org.secpod.oval:def:50723
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ...

oval:org.secpod.oval:def:50724
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ...

oval:org.secpod.oval:def:50725
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delet ...

oval:org.secpod.oval:def:50726
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ...

oval:org.secpod.oval:def:50727
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to a ...

oval:org.secpod.oval:def:50729
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50730
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first ha ...

oval:org.secpod.oval:def:50731
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on t ...

oval:org.secpod.oval:def:50732
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first ha ...

oval:org.secpod.oval:def:50733
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first ha ...

oval:org.secpod.oval:def:50734
An information vulnerability exists when Windows improperly discloses file information. Successful exploitation of the vulnerability could allow the attacker to read the contents of files on disk. To exploit the vulnerability, an attacker would have to log onto an affected system and run a specially ...

oval:org.secpod.oval:def:50736
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new a ...

oval:org.secpod.oval:def:50737
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on t ...

oval:org.secpod.oval:def:50738
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit t ...

oval:org.secpod.oval:def:50740
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delet ...

oval:org.secpod.oval:def:50755
The host is missing an important security update for KB4487044

oval:org.secpod.oval:def:50711
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability, in most sit ...

oval:org.secpod.oval:def:50712
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability, in most si ...

oval:org.secpod.oval:def:50713
A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. To exploit the vulnerability, an attacker could send a ...

oval:org.secpod.oval:def:50714
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that ...

oval:org.secpod.oval:def:50715
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50716
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50717
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50718
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50719
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50090
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50091
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50092
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50093
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50094
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50095
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50096
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50097
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50088
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:50089
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open ...

oval:org.secpod.oval:def:51383
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machi ...

oval:org.secpod.oval:def:51384
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new a ...

oval:org.secpod.oval:def:51375
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to ope ...

oval:org.secpod.oval:def:51379
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerab ...

oval:org.secpod.oval:def:51390
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerabil ...

oval:org.secpod.oval:def:51392
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specia ...

oval:org.secpod.oval:def:51394
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the users system. To exploit the vulnerability, an attacker could host a ...

oval:org.secpod.oval:def:51393
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ...

oval:org.secpod.oval:def:51396
A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could g ...

oval:org.secpod.oval:def:51395
An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory. An attacker who successfully exploited this vulnerability could use the information to further exploit the victim system. To exploit this vulnerability, an attacker would have t ...

oval:org.secpod.oval:def:51389
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerabil ...

oval:org.secpod.oval:def:51388
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ...

oval:org.secpod.oval:def:51398
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to ...

oval:org.secpod.oval:def:51397
An elevation of privilege vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vu ...

oval:org.secpod.oval:def:51399
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability ...

oval:org.secpod.oval:def:51414
The host is missing an critical security update for KB4489899

oval:org.secpod.oval:def:51400
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit ...

oval:org.secpod.oval:def:51402
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. To exploit the vulnerability, an attacker would have to either l ...

oval:org.secpod.oval:def:51401
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to ...

oval:org.secpod.oval:def:51404
A remote code execution vulnerability exists in the way that the ActiveX Data objects (ADO) handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vul ...

oval:org.secpod.oval:def:51403
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to l ...

oval:org.secpod.oval:def:51405
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or ...

oval:org.secpod.oval:def:51407
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerabil ...

oval:org.secpod.oval:def:54171
An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, ...

oval:org.secpod.oval:def:54174
An information disclosure vulnerability exists when the Terminal Services component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a users system.To exploit this vulnerability, an attacker would ...

oval:org.secpod.oval:def:54173
An information disclosure vulnerability exists when Windows Task Scheduler improperly discloses credentials to Windows Credential Manager. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. An attacker could then install programs ...

oval:org.secpod.oval:def:54728
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delet ...

oval:org.secpod.oval:def:54741
The host is missing an important security update for KB4494441

oval:org.secpod.oval:def:54203
The host is missing an important security update for KB4493509

oval:org.secpod.oval:def:47937
The host is missing a critical security update for KB4462922

oval:org.secpod.oval:def:47936
The host is missing a critical security update for KB4462919

oval:org.secpod.oval:def:47939
The host is missing a critical security update for KB4462926

oval:org.secpod.oval:def:47935
The host is missing a critical security update for KB4462918

oval:org.secpod.oval:def:47934
The host is missing a critical security update for KB4462917

oval:org.secpod.oval:def:47942
The host is missing a critical security update for KB4462937

oval:org.secpod.oval:def:47943
The host is missing a critical security update for KB4462941

oval:org.secpod.oval:def:43427
The host is missing a critical security update 4056890

oval:org.secpod.oval:def:45418
The host is missing an important security update for KB4103731

oval:org.secpod.oval:def:45419
The host is missing an important security update for KB4103730

oval:org.secpod.oval:def:45416
The host is missing an important security update for KB4134651

oval:org.secpod.oval:def:45421
The host is missing an important security update 4103715

oval:org.secpod.oval:def:45543
The host is missing an important security update 4103718

oval:org.secpod.oval:def:45422
The host is missing an important security update for KB4103716

oval:org.secpod.oval:def:45423
The host is missing an important security update for KB4103721

oval:org.secpod.oval:def:45435
The host is missing an important security update for KB4103723

oval:org.secpod.oval:def:45436
The host is missing an important security update for KB4103725

oval:org.secpod.oval:def:45437
The host is missing an important security update 4103726

oval:org.secpod.oval:def:45438
The host is missing an important security update for KB4103727

oval:org.secpod.oval:def:45440
The host is missing an important security update 4103712

CVE    305
CVE-2017-0286
CVE-2016-0026
CVE-2016-3342
CVE-2016-3343
...
*CPE
cpe:/o:microsoft:windows_server_2016:-

© SecPod Technologies