Download
| Alert*
oval:org.secpod.oval:def:3221
The host is installed with Google Chrome before 15.0.874.120 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3232 The host is installed with Google Chrome before 15.0.874.120 or Apple Safari before 5.1.4 and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4820 The host is missing a security update according to APPLE-SA-2012-03-12-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious contents. Successful exploitation allows remote attackers to execute remote code or gai ... oval:org.secpod.oval:def:3211 The host is installed with Google Chrome before 15.0.874.120 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to c ... oval:org.secpod.oval:def:3222 The host is installed with Google Chrome before 15.0.874.120 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4615 The host is missing a critical security update according to Apple advisory, APPLE-SA-2012-03-07-1. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle vectors related to iTunes Store browsing. Successful exploitati ... oval:org.secpod.oval:def:4756 The host is missing a security update according to APPLE-SA-2012-03-12-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious contents. Successful exploitation allows remote attackers to execute remote code or gai ... |