Download
| Alert*
oval:org.secpod.oval:def:701052
webkit: Web content engine library for GTK+ Multiple security vulnerabilities were fixed in WebKit. oval:org.secpod.oval:def:7284 The host is missing a security update according to Apple advisory, APPLE-SA-2012-09-12-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbit ... oval:org.secpod.oval:def:400361 - Update to 19.0.1079 Security Fixes : * High CVE-2011-3050: Use-after-free with first-letter handling * High CVE-2011-3045: libpng integer issue from upstream * High CVE-2011-3051: Use-after-free in CSS cross-fade handling * High CVE-2011-3052: Memory corruption in WebGL canvas handling * High CVE- ... oval:org.secpod.oval:def:4891 The host is installed with Google Chrome before 17.0.963.83 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to block splitting. Successful exploitation could allow remote attackers to cause denial of service or possibly have u ... oval:org.secpod.oval:def:4867 The host is installed with Google Chrome before 17.0.963.83 or Apple Safari before 6.0 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to block splitting. Successful exploitation could allow remote attackers to cause denial of ... oval:org.secpod.oval:def:4879 The host is installed with Google Chrome before 17.0.963.83 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to block splitting. Successful exploitation could allow remote attackers to cause denial of service or possibly have u ... oval:org.secpod.oval:def:4855 The host is installed with Google Chrome before 17.0.963.83 or Apple Tunes before 10.7 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to block splitting. Successful exploitation could allow remote attackers to cause denial of ... |