[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26549 Download | Alert*

The host is installed with Oracle Java Runtime Environment (JRE) component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier, 5.0 update 45 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to libraries. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Oracle Java Runtime Environment (JRE) component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to serviceability. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Oracle Java Runtime Environment (JRE) component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to libraries. Successful exploitation allows attackers to affect confidentiality and availability.

The host is installed with Oracle Javadoc component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier or 5.0 update 45 and earlier or JavaFX 2.2.21 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to javadoc. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java Runtime Environment (JRE) component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier, 5.0 update 45 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to 2D. Successful exploitation allows attackers to affect confidentiality and availability.

The host is installed with Oracle Java Runtime Environment (JRE) component in Oracle Java SE 7 update 21 and earlier, 6 update 45 and earlier, 5.0 update 45 and earlier and is prone to unspecified vulnerability. The flaw is present in the applications, which fail to handle vectors related to 2D. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Apache HTTP Server 2.2.x before 2.2.25 and is prone to a denial of service vulnerability. The flaw is present in the application, which does not properly determine whether DAV is enabled for a URI via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI. Successful exploita ...

The host is installed with OpenSSL 0.9.8s or 1.0.0f and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly support DTLS applications. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with OpenSSL 0.9.8v and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted DER data. Successful exploitation allow remote attackers to conduct buffer overflow attacks, and cause a denial of service.

The host is installed with OpenSSL 1.0.x before 1.0.0e and is prone to denial of service vulnerability. A flaw is present in the application, which does not initialize certain structure members. Successful exploitation makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.


Pages:      Start    1193    1194    1195    1196    1197    1198    1199    1200    1201    1202    1203    1204    1205    1206    ..   2654

© SecPod Technologies