[Forgot Password]
Login  Register Subscribe

23631

 
 

126995

 
 

100182

 
 

909

 
 

80298

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11569 Download | Alert*

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to a (1) zero-length quantifier or (2) look-behind expression. Successful exploitation could allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to a (1) zero-length quantifier or (2) look-behind expression. Successful exploitation could allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact.

The host is installed with Microsoft Internet Explorer, Edge, Mozilla Firefox before 25.0.1 or Google Chrome before 48.0.2564.82 and is prone to plaintext recovery vulnerability. A flaw is present in the applications, which fail to handle statistical analysis of ciphertext. Successful exploitation allows remote attacker to conduct plaintext-recovery attacks.

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that contain a %3D sequence but no = (equals sign) character. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Swing. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 or earlier or 1.4.2_37 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows remote attackers to affect availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 or earlier or 1.4.2_37 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle CORBA component. Successful exploitation allows remote attackers to affect integrity.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1156

© 2013 SecPod Technologies