Download
| Alert*
oval:org.secpod.oval:def:2106048
Oracle Solaris 11 - ( CVE-2020-3909 ) oval:org.secpod.oval:def:62209 The host is missing a security update according to Apple advisory, APPLE-SA-2020-03-24-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious web content. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:62208 The host is missing a security update according to Apple advisory, APPLE-SA-2020-03-24-6. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a malicious web content. Successful exploitation could allow attackers to execute arbitrar ... oval:org.secpod.oval:def:2004430 A buffer overflow was addressed with improved size validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Multiple issues in libxml2. oval:org.secpod.oval:def:62202 The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a size validation issue. Successful exploitation allows an attacker to produce multiple impacts including buffer ... oval:org.secpod.oval:def:62210 The host is installed with Apple iTunes before 12.10.5 or iCloud before 7.18 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle a size validation issue. Successful exploitation could allow attackers to cause unspecified impact. oval:org.secpod.oval:def:62181 The host is missing a security update according to Apple advisory, APPLE-SA-2020-03-24-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or ... |