Download
| Alert*
oval:org.secpod.oval:def:31380
Microsoft OneNote 2013 SP1 is installed oval:org.secpod.oval:def:31365 The host is missing an important security update according to Microsoft security bulletin, MS15-116. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle specially crafted Microsoft Office file. Successful explo ... oval:org.secpod.oval:def:31390 The host is installed with Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, P ... oval:org.secpod.oval:def:36839 The host is installed with Microsoft Office 2016 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle crafted OneNote file. An attacker who exploited the vulnerability could use the information to compromise the users computer o ... oval:org.secpod.oval:def:36746 The host is installed with Microsoft Office OneNote 2007, 2010, 2013 or 2016 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which improperly discloses its memory contents. An attacker who exploited the vulnerability could use the information to compromise t ... oval:org.secpod.oval:def:36841 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:36750 The host is missing a critical security update according to Microsoft security bulletin, MS16-099. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle objects in memory. Successful exploitation could allow to execute arbitr ... |