Download
| Alert*
oval:org.secpod.oval:def:1600169
A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server. A memory leak flaw was found in the way an Ope ... oval:org.secpod.oval:def:23428 The host is installed with Xcode before 7.0 on Apple Mac OS X 10.10.4 or later, Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x before 10.10.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly enforce the no-ssl3 build option. Successfu ... oval:org.secpod.oval:def:601802 Several vulnerabilities have been found in OpenSSL, the Secure Sockets Layer library and toolkit. CVE-2014-3513 A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol extension data. A remote attacker could send multiple specially crafted handshake messa ... oval:org.secpod.oval:def:21399 The host is installed with OpenSSL 1.0.1 before 1.0.1j, 1.0.0 before 1.0.0o or 0.9.8 before 0.9.8zc and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a SSL handshake request. Successful exploitation could allow attackers to mak ... oval:org.secpod.oval:def:28657 The host is missing a security update according to Apple advisory, APPLE-SA-2015-09-16-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to obtain sensitive i ... oval:org.secpod.oval:def:23401 The host is missing a security update according to Apple advisory, APPLE-SA-2015-01-27-4. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code or crash ... |