The following SCAP content has been released to SCAP Repo and SecPod ANCOR. SecPod Saner will automatically pull the relevant content on its next scheduled update.

oval:org.secpod.oval:def:25800 CVE-2015-2474, Memory corruption vulnerability in Server Message Block in Microsoft Windows due to crafted logging activities
oval:org.secpod.oval:def:25801 CVE-2015-2474,
MS15-083,
Vulnerability in Server Message Block could allow remote code execution – MS15-083
oval:org.secpod.oval:def:25802 CVE-2015-2476, Information disclosure vulnerability in WebDAV Client while using SSL 2.0
oval:org.secpod.oval:def:25803 CVE-2015-2476,
MS15-089,
Vulnerability in WebDAV could allow information disclosure – MS15-089
oval:org.secpod.oval:def:25805 CVE-2015-1769,
MS15-085,
Vulnerability in Mount Manager could allow elevation of privilege – MS15-085
oval:org.secpod.oval:def:25804 CVE-2015-1769, Mount Manager elevation of privilege vulnerability in Microsoft Windows
oval:org.secpod.oval:def:25806 CVE-2015-2440, Information disclosure vulnerability in Microsoft XML Core Services – CVE-2015-2440
oval:org.secpod.oval:def:25807 CVE-2015-2434, Information disclosure vulnerability in Microsoft XML Core Services – CVE-2015-2434
oval:org.secpod.oval:def:25808 CVE-2015-2471, Information disclosure vulnerability in Microsoft XML Core Services – CVE-2015-2471
oval:org.secpod.oval:def:25809 CVE-2015-2434,
CVE-2015-2440,
CVE-2015-2471,
MS15-084,
Vulnerabilities in XML Core Services could allow information disclosure – MS15-084
oval:org.secpod.oval:def:25810 CVE-2015-2428, Elevation of privilege vulnerability in Microsoft Windows Object Manager – CVE-2015-2428
oval:org.secpod.oval:def:25811 CVE-2015-2429, Elevation of privilege vulnerability in Microsoft Windows Registry – CVE-2015-2429
oval:org.secpod.oval:def:25812 CVE-2015-2430, Elevation of privilege vulnerability in Microsoft Windows Filesystem – CVE-2015-2430
oval:org.secpod.oval:def:25813 CVE-2015-2428,
CVE-2015-2429,
CVE-2015-2430,
MS15-090,
Multiple Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege – MS15-090
oval:org.secpod.oval:def:25816 CVE-2015-2472,
CVE-2015-2473,
MS15-082,
Vulnerabilities in RDP could allow remote code execution – MS15-082
oval:org.secpod.oval:def:25814 CVE-2015-2472, Remote desktop session host spoofing vulnerability in Microsoft Windows
oval:org.secpod.oval:def:25815 CVE-2015-2473, Remote Desktop Protocol DLL Planting remote code execution vulnerability in Microsoft Windows
oval:org.secpod.oval:def:25818 cpe:/a:microsoft:.net_framework:4.6, Microsoft .NET Framework 4.6 is installed
oval:org.secpod.oval:def:25817 CVE-2015-1769, RyuJIT Optimization Elevation of privilege vulnerability in Microsoft .NET Framework – CVE-2015-1769
oval:org.secpod.oval:def:25819 CVE-2015-2480, RyuJIT Optimization Elevation of privilege vulnerability in Microsoft .NET Framework – CVE-2015-2480
oval:org.secpod.oval:def:25820 CVE-2015-2481, RyuJIT Optimization Elevation of privilege vulnerability in Microsoft .NET Framework – CVE-2015-2481
oval:org.secpod.oval:def:25821 CVE-2015-2479,
CVE-2015-2480,
CVE-2015-2481,
MS15-092,
Vulnerabilities in .NET Framework could allow elevation of privilege – MS15-092
oval:org.secpod.oval:def:25831 CVE-2015-2446, Memory corruption vulnerability in Internet Explorer while accessing an object in memory
oval:org.secpod.oval:def:25832 CVE-2015-2447, Memory corruption vulnerability in Internet Explorer while accessing an object in memory – CVE-2015-2447
oval:org.secpod.oval:def:25833 CVE-2015-2448, Memory corruption vulnerability in Internet Explorer – CVE-2015-2448
oval:org.secpod.oval:def:25834 CVE-2015-2450, Memory corruption vulnerability in Internet Explorer – CVE-2015-2450
oval:org.secpod.oval:def:25835 CVE-2015-2451, Memory corruption vulnerability in Internet Explorer – CVE-2015-2451
oval:org.secpod.oval:def:25836 CVE-2015-2423,
CVE-2015-2441,
CVE-2015-2442,
CVE-2015-2443,
CVE-2015-2444,
CVE-2015-2445,
CVE-2015-2446,
CVE-2015-2447,
CVE-2015-2448,
CVE-2015-2449,
CVE-2015-2450,
CVE-2015-2451,
CVE-2015-2452,
MS15-079,
Multiple vulnerabilities in Internet Explorer – MS15-079
oval:org.secpod.oval:def:25824 CVE-2015-2441, Memory corruption vulnerability in Internet Explorer – CVE-2015-2441
oval:org.secpod.oval:def:25822 CVE-2015-2423,
MS15-088,
Unsafe Command Line Parameter Passing could lead to information disclosure vlunerability – MS15-088
oval:org.secpod.oval:def:25823 CVE-2015-2423, Unsafe Command Line Parameter passing vulnerability in Internet Explorer and Microsoft Windows
oval:org.secpod.oval:def:25825 CVE-2015-2449, ASLR Bypass vulnerability in Internet Explorer – CVE-2015-2449
oval:org.secpod.oval:def:25826 CVE-2015-2452, Memory corruption vulnerability in Internet Explorer – CVE-2015-2452
oval:org.secpod.oval:def:25827 CVE-2015-2442, Edge memory corruption vulnerability in Internet Explorer while accessing an object in memory
oval:org.secpod.oval:def:25828 CVE-2015-2443, Memory corruption vulnerability in Internet Explorer – CVE-2015-2443
oval:org.secpod.oval:def:25829 CVE-2015-2444, Memory corruption vulnerability in Internet Explorer – CVE-2015-2444
oval:org.secpod.oval:def:25830 CVE-2015-2445, ASLR Bypass vulnerability in Internet Explorer – CVE-2015-2445
oval:org.secpod.oval:def:25837 CVE-2015-2441, Memory corruption vulnerability in Microsoft Edge – CVE-2015-2441
oval:org.secpod.oval:def:25839 CVE-2015-2442, Memory corruption vulnerability in Microsoft Edge – CVE-2015-2442
oval:org.secpod.oval:def:25840 CVE-2015-2446, Memory corruption vulnerability in Microsoft Edge – CVE-2015-2446
oval:org.secpod.oval:def:25841 CVE-2015-2449, ASLR bypass vulnerability in Microsoft Edge – CVE-2015-2449
oval:org.secpod.oval:def:25842 CVE-2015-2441,
CVE-2015-2442,
CVE-2015-2446,
CVE-2015-2449,
MS15-091,
Cumulative security update for Microsoft Edge – MS15-091
oval:org.secpod.oval:def:25838 cpe:/a:microsoft:edge, Microsoft Edge is installed
Loading Facebook Comments ...

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>