Download
| Alert*
oval:org.secpod.oval:def:5846
Microsoft Exchange Server 2010 SP1 is installed oval:org.secpod.oval:def:6697 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6696 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6695 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6694 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6701 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6700 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6699 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6698 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6705 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6704 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6703 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6702 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:6706 The host is missing a critical security update according to Microsoft security bulletin, MS12-058. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle a specially crafted file through Outlook Web Access in a br ... oval:org.secpod.oval:def:6693 The host is installed with Microsoft Exchange Server 2007 or 2010 or FAST Search Server 2010 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted file through Outlook Web Access in a browser. Successful exploitation co ... oval:org.secpod.oval:def:8186 The host is installed with Exchange Server 2007 or Exchange Server 2010 and is prone to remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server, which fails to properly handle WebReady Document Viewing feature. Successful exploitation could allow to run code on ... oval:org.secpod.oval:def:8187 The host is installed with Exchange Server 2007 or Exchange Server 2010 and is prone to remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server, which fails to properly handle WebReady Document Viewing feature. Successful exploitation could allow to run code on ... oval:org.secpod.oval:def:8184 The host is missing a critical security update according to Microsoft security bulletin, MS12-080. The update is required to fix remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server, which fails to properly handle the WebReady Document Viewing and Outlook Web ... oval:org.secpod.oval:def:8185 The host is installed with Exchange Server 2007 or Exchange Server 2010 and is prone to denial of service vulnerability. A flaw is present in the Microsoft Exchange Server, which fails to properly handle the RSS feeds. Successful exploitation could cause exchange databases to dismount, and potential ... |