[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84637

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 11204 Download | Alert*

The host is installed with Oracle Java SE 6u95 or earlier, 7u80 or earlier, 8u45 or earlier or Java FX 2.2.80 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 6u95 or earlier, 7u80 or earlier, 8u45 or earlier or Java FX 2.2.80 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, Windows Vista, 7, 8 or 8.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which improperly handles specially crafted OpenType fonts. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

The host is installed with Adobe Shockwave Player before 12.1.9.159 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Shockwave Player before 12.1.9.159 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to a remote code execution vulnerability. A flaw is present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation could allow attackers to take complete control of an affected system.

The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to a remote code execution vulnerability. A flaw is present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation could allow attackers to take complete control of an affected system.

The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which improperly casts pointers to an incorrect class. Successful exploitation could allow attackers to gain elevated privileges that could be used to view, change, or delete data; or create new accounts.

The host is installed with Vbscript 5.6 or 5.7 or 5.8 scripting engines and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to execute remote code on a target system.

The host is installed with Internet Explorer 7, 8, 9, 10 or 11 and is prone to an elevation of privilege Vulnerability. A flaw is present in the application, which does not properly validate permissions under specific conditions. An attacker who successfully exploited the vulnerability could elevate privileges.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   1120

© 2013 SecPod Technologies