Download
| Alert*
oval:org.secpod.oval:def:1000282
The remote host is missing a patch 116105-12 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:1000202 The remote host is missing a patch 116106-11 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:600200 Two buffer overflows were found in the Freetype font library, which could lead to the execution of arbitrary code. oval:org.secpod.oval:def:700039 Marc Schoenefeld discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. This issue only affected Ubuntu 6 ... oval:org.secpod.oval:def:300194 Multiple vulnerabilities were discovered and corrected in freetype2: An error within the "Ins_SHZ" function in src/truetype/ttinterp.c when handling the "SHZ" bytecode instruction can be exploited to cause a crash and potentially execute arbitrary code via a specially crafted fon ... oval:org.secpod.oval:def:3048 The host is installed with Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted SHZ bytecode instruction. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3050 The host is missing an important security update according to, APPLE-SA-2011-03-21-1. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fail to sanitize user supplied input. Successful exploitation could allow attackers to e ... |