Download
| Alert*
oval:org.secpod.oval:def:25878
The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to p ... oval:org.secpod.oval:def:25879 The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform a ... oval:org.secpod.oval:def:25880 The host is installed with Microsoft Office 2011 for Mac and is prone to an integer underflow vulnerability. A flaw is present in the application, which decreases an integer value beyond its intended minimum value. An attacker who successfully exploited this vulnerability could gain the same user ri ... oval:org.secpod.oval:def:25881 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to p ... oval:org.secpod.oval:def:25882 The host is missing an important security update according to Microsoft security bulletin, MS15-081. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to ex ... oval:org.secpod.oval:def:24312 The host is installed with Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:24313 The host is missing an important security update according to Microsoft security bulletin, MS15-046. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to execute a ... oval:org.secpod.oval:def:17402 The host is installed with Microsoft Office 2011 for Mac and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary ... oval:org.secpod.oval:def:17403 The host is missing a critical security update according to Microsoft bulletin, MS14-017. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly allocate memory. Successful exploitation allows attackers to execute arbitrary code or c ... oval:org.secpod.oval:def:24099 The host is installed with Microsoft Word 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle rich text format files. Successful exploitation could allow attackers to perform actions in the security context of the curre ... oval:org.secpod.oval:def:24100 The host is installed with Microsoft Offce 2011 for Mac and is prone to a XSS vulnerability. A flaw is present in the application, which fails to properly properly sanitize HTML strings. Successful exploitation could allow attackers to could read content that the attacker is not authorized to read o ... oval:org.secpod.oval:def:24101 The host is missing a critical security update according to Microsoft security bulletin, MS15-033. The update is required to fix multiple vulnerabilities. Ths flaws are present in the application, which fails to properly properly sanitize crafted data. Successful exploitation could allow attackers t ... oval:org.secpod.oval:def:21369 The host is missing an important security update according to Microsoft security bulletin, MS14-061. The update is required to fix a remote code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted word file. Successful exploitation could allow an attacker t ... oval:org.secpod.oval:def:21368 The host is installed with Microsoft Office 2007, Word 2007, 2010, Office Compatibility Pack, Sharepoint Server 2010 or Office Web Apps 2010 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted word file. Successful exploitation ... oval:org.secpod.oval:def:25370 The host is missing an important security update according to Microsoft security bulletin, MS15-070. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to handle crafted office files. Successful exploitation could allow attackers to execute a ... oval:org.secpod.oval:def:25368 The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:25369 The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:21877 The host is missing a critical security update according to Microsoft security bulletin, MS14-081. The update is required to fix a remote code execution vulnerability. A flaw is present in the applications, which fails to handle a specially crafted Microsoft Word file. Successful exploitation could ... oval:org.secpod.oval:def:21876 The host is installed with Microsoft Office 2011 for Mac and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle a specially crafted Microsoft Word file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:32977 The host is missing a critical security update according to Microsoft security bulletin, MS16-015. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle objects in memory. Successful exploitation could allow attacker ... oval:org.secpod.oval:def:32976 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:32975 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:32974 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:42085 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:42083 A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the f ... oval:org.secpod.oval:def:33530 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:33531 The host is missing a critical security update according to Microsoft security bulletin, MS16-029. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle objects in memory. Successful exploitation could allow attacker ... oval:org.secpod.oval:def:38321 The host is missing an important security update according to Microsoft security bulletin, MS16-148. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle objects in memory. Successful exploitation could run arbitrar ... oval:org.secpod.oval:def:38323 The host is installed with Excel for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:38324 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:38325 The host is installed with Word for Mac 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:38327 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:38328 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:31762 The host is missing a critical security update according to Microsoft security bulletin, MS15-131. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to handle specially crafted Microsoft Office file. Successful exploit ... oval:org.secpod.oval:def:30031 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:40539 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:31760 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the cur ... oval:org.secpod.oval:def:40537 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:31761 The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current use ... oval:org.secpod.oval:def:40538 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:39760 The host is missing security update for KB3212218. This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. oval:org.secpod.oval:def:30030 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:30029 The host is missing an important security update according to Microsoft bulletin, MS15-110. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to properly handle objects in memory or handle a specially crafted Office fi ... oval:org.secpod.oval:def:39759 A spoofing vulnerability exists in when Microsoft Outlook for Mac improperly validates HTML tag input. An attacker who successfully tricked the user could gain access to the user's authentication information or login credentials. In an email attack scenario an attacker could exploit the vulnerabilit ... oval:org.secpod.oval:def:39350 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:39351 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:39352 An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. Exploitation of the vulnerab ... oval:org.secpod.oval:def:39353 The host is missing an important security update according to Microsoft security bulletin, MS17-014. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle objects in memory. Successful exploitation could run arbitrar ... oval:org.secpod.oval:def:26567 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to p ... oval:org.secpod.oval:def:26569 The host is missing a critical security update according to Microsoft bulletin, MS15-099. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle objects in memory or handle a specially crafted Office file. An attacker who succ ... oval:org.secpod.oval:def:26568 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to p ... oval:org.secpod.oval:def:39348 An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user's computer or data. To exploit the vulnerability, an attacker could craft a special docum ... oval:org.secpod.oval:def:15652 The host is missing an important security update according to Microsoft bulletin, MS13-085. The update is required to fix remote code execution vulnerability. The flaw is present in the application, which fails to handle certain objects in memory while parsing specially crafted Office files. Success ... oval:org.secpod.oval:def:15653 The host is installed with Microsoft Office for Mac 2011 and is prone to remote code execution vulnerability. The flaw is present in the application, which fails to handle certain objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbi ... oval:org.secpod.oval:def:31399 The host is missing an important security update according to Microsoft security bulletin, MS15-116. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle specially crafted Microsoft Office file. Successful explo ... oval:org.secpod.oval:def:41271 The host is missing security update KB3212224 oval:org.secpod.oval:def:41270 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:14138 The host is missing an important security update according to Microsoft bulletin, MS13-051. The update is required to fix buffer overflow vulnerability. A flaw is present in the application, which is caused when Microsoft Office components for processing PNG files do not properly handle memory alloc ... oval:org.secpod.oval:def:31396 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle specially crafted Microsoft Office file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:31397 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle specially crafted Microsoft Office file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:31398 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a crafted e-mail message that is mishandled by Outlook for Mac. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:40990 A remote code execution vulnerability exist in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. oval:org.secpod.oval:def:40993 The host is missing security update for KB3212223 oval:org.secpod.oval:def:40991 A remote code execution vulnerability exist in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. oval:org.secpod.oval:def:14141 Microsoft Office 2011 Service Pack 3 for Mac is installed oval:org.secpod.oval:def:38330 The host is installed with Word for Office 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:38331 The host is installed with Word for Office 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:38329 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:42084 An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could ... oval:org.secpod.oval:def:34005 The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:34006 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37990 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37992 The host is installed with Word for Mac 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37991 The host is installed with Word for Mac 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37989 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37988 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37987 The host is installed with Word for Mac 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37986 The host is installed with Word for Mac 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37985 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37984 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37983 The host is missing an important security update according to Microsoft security bulletin, MS16-133. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle objects in memory. Successful exploitation could run arbitrar ... oval:org.secpod.oval:def:35577 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:35578 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:35575 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:35576 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:32616 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:32615 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:32617 The host is missing a critical security update according to Microsoft security bulletin, MS16-004. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle objects in memory. Successful exploitation could allow attacker ... oval:org.secpod.oval:def:37449 The host is missing an important security update according to Microsoft security bulletin, MS16-121. The update is required to fix a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted RTF files. Successful exploitation could allow attackers to execut ... oval:org.secpod.oval:def:37448 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted RTF files. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:35966 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:35964 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:35965 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:35962 The host is missing a critical security update according to Microsoft security bulletin, MS16-088. The update is required to fix to multiple memory corruption vulnerabilities. The flaws are present in the applications, which fail to handle objects in memory. Successful exploitation could allow attac ... oval:org.secpod.oval:def:35963 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:37091 The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle a crafted office file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:37087 The host is missing a critical security update according to Microsoft security bulletin, MS16-107. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle objects in memory. Successful exploitation could allow attackers to run arbitrary ... oval:org.secpod.oval:def:36841 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:36837 The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. oval:org.secpod.oval:def:42082 A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the f ... oval:org.secpod.oval:def:42086 The host is missing security update for KB3212225 oval:org.secpod.oval:def:15459 The host is missing an important security update according to Microsoft bulletin, MS13-073. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain objects in memory. Successful exploitation allows attackers to execute arbitrary ... oval:org.secpod.oval:def:15460 The host is installed with Microsoft Office for Mac 2011 and is prone to remote code execution vulnerability. A flaw are present in the applications, which fail to handle certain objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbit ... |