[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Oracle Java SE 5.0 before Update 20 and is prone to unspecified vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors. Successful exploitation has unknown impact and attack vectors.

The host is installed with Oracle Java SE 5.0 before Update 20 and is prone to multiple unspecified vulnerabilities. A flaw is present in the applications, which fails to properly handle unknown vectors. Successful exploitation has unknown impact and attack vectors.

The host is installed with Oracle Java SE 5.0 before Update 20 and is prone to multiple unspecified vulnerabilities. A flaw is present in the applications, which fails to properly handle unknown vectors. Successful exploitation allows context-dependent attackers to cause a denial of service.

The host is installed with Oracle Java SE 6 before Update 15 and is prone to unspecified vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors. Successful exploitation allows context-dependent attackers to cause a denial of service.

The host is installed with Oracle Java SE 5.0 before update 22 and 6 before update 17 and is prone to unspecified vulnerability. A flaw is present in the applications, which fails to properly handle a certain test suite. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Oracle Java SE 6 before update 17 and is prone to unspecified vulnerability. A flaw is present in the applications, which does not properly handle vectors related to a "regression". Successful exploitation has unspecified impact and attack vectors.

Buffer overflow in Microsoft Jet Database Engine 4.0 allows remote attackers to execute arbitrary code via a specially-crafted database query.

The host is installed with Oracle Weblogic Server 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unauthenticated network access via T3. Successful exploitation allows an attacker to take over Oracle WebLogic Server.

The host is installed with OpenAFS before 1.6.24 and is prone to an denial of service vulnerability. The flaw is present in the application, which fails to handle unserialized RPC calls. Successful exploitation allow attackers to perform denial of service attack.

The host is installed with Oracle VM VirtualBox before 5.1.32 or 5.2.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.


Pages:      Start    1373    1374    1375    1376    1377    1378    1379    1380    1381    1382    1383    1384    1385    1386    ..   1502

© SecPod Technologies