[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment component. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to sound and unspecified APIs. Successful exploitation allow remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to sound and unspecified APIs. Successful exploitation allow remote attackers to affect confidentiality, integrity, and availability.

The host is installed with PHP and is prone to vulnerability. A flaw is present in the iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 where the function skips the headers that are unrecognized by the iconv and mbstring implementations. Successful exploitation allows attackers to trigger an incomplete output array via a crafted Subject header in an e-mail message.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to swing. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality.

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to JDBC. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to HotSpot. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with VideoLAN VLC media player through 3.0.7.1 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in modules/demux/mp4/mp4.c file. Successful exploitation could allow remote attackers to cause a denial of service or possibly have unspecified other impact.


Pages:      Start    1072    1073    1074    1075    1076    1077    1078    1079    1080    1081    1082    1083    1084    1085    ..   1483

© SecPod Technologies