Download
| Alert*
oval:org.secpod.oval:def:2761
The host is installed with Google Chrome before 14.0.835.202 or Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle SVG text. Successful exploitation could allow attackers to crash the se ... oval:org.secpod.oval:def:2754 The host is installed with Google Chrome before 14.0.835.202 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle SVG text. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2747 The host is installed with Google Chrome before 14.0.835.202 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle SVG text. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:2768 The host is installed with Google Chrome before 14.0.835.202 or Apple Safari before 5.1.4 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle SVG text. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4820 The host is missing a security update according to APPLE-SA-2012-03-12-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious contents. Successful exploitation allows remote attackers to execute remote code or gai ... oval:org.secpod.oval:def:4615 The host is missing a critical security update according to Apple advisory, APPLE-SA-2012-03-07-1. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle vectors related to iTunes Store browsing. Successful exploitati ... oval:org.secpod.oval:def:4756 The host is missing a security update according to APPLE-SA-2012-03-12-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle malicious contents. Successful exploitation allows remote attackers to execute remote code or gai ... |