[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

125989

 
 

909

 
 

104883

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 9073 Download | Alert*

The host is installed with Splunk 4.0 through 4.3 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to prevent the injection of web script or HTML. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 6 Update 35 or earlier or JavaFX 2.2 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle specially crafted content. Successful exploitation allows attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.

The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.2 or Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted XML file. Successful exploitation could allow context-dependent attackers to cause denial of service (file descriptor consumption).

The host is installed with Adobe Flash Professional before CS6 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Apple Remote Desktop 3.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to maintain a secure connection to a 3rd party VNC server when "Encrypt all network data" is set. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Web Container or Deployment. Successful exploitation allows remote attackers to affect confidentiality and integrity.


Pages:      Start    846    847    848    849    850    851    852    853    854    855    856    857    858    859    ..   907

© SecPod Technologies