[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26381 Download | Alert*

The host is installed with Oracle Java Runtime Environment (JRE) component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to libraries. Successful exploitation allows attackers to affect confidentiality and availability.

The host is installed with Oracle Javadoc component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier or 5.0 update 45 and earlier or JavaFX 2.2.21 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to javadoc. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java Runtime Environment (JRE) component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier, 5.0 update 45 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to 2D. Successful exploitation allows attackers to affect confidentiality and availability.

The host is installed with Oracle Java Runtime Environment (JRE) component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier, 5.0 update 45 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to 2D. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Apache HTTP Server 2.2.x before 2.2.25 and is prone to a denial of service vulnerability. The flaw is present in the application, which does not properly determine whether DAV is enabled for a URI via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI. Successful exploita ...

The host is installed with OpenSSL 0.9.8s or 1.0.0f and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly support DTLS applications. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with OpenSSL 0.9.8v and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted DER data. Successful exploitation allow remote attackers to conduct buffer overflow attacks, and cause a denial of service.

The host is installed with OpenSSL 1.0.x before 1.0.0e and is prone to denial of service vulnerability. A flaw is present in the application, which does not initialize certain structure members. Successful exploitation makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.

The host is installed with OpenSSL before 0.9.8s and is prone to double free vulnerability. A flaw is present in the application, which fails when X509_V_FLAG_POLICY_CHECK is enabled. Successful exploitation allows remote attackers to have an unspecified impact by triggering failure of a policy check.

The host is installed with OpenSSL before 0.9.8s or 1.x before 1.0.0f and is prone to denial of service vulnerability. A flaw is present in DTLS implementation in OpenSSL, which performs a MAC check only if certain padding is valid. Successful exploitation makes it easier for remote attackers to recover plaintext via a padding oracle attack.


Pages:      Start    1177    1178    1179    1180    1181    1182    1183    1184    1185    1186    1187    1188    1189    1190    ..   2638

© SecPod Technologies