[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81309

 
 

123

 
 
Paid content will be excluded from the download.

Filter
Matches : 12182 Download | Alert*

The host is installed with Oracle Java SE 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Hotspot. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 5.0u75 and earlier, 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JSSE. Successful exploitation could allow attackers to affect confidentiality and integrity.

The host is installed with Oracle Java SE 5.0u75 and earlier, 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Libraries. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 5.0u75 and earlier, 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Libraries. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to an unspecified vulnerability. The flaw is present in the Application, which fails to handle unspecified vectors that trigger memory corruption. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with LibreOffice 4.x before 4.2.7 or 4.3.x before 4.3.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted request to TCP port 1599. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with VMware Movie Decoder before 6.5.5 build 328052, 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052, 7.x before 7.1.2 build 301548, VMware Player 2.5.x before 2.5.5 build 246459 or 3.x before 3.1.2 build 301548 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted video file. ...

The host is installed with VMware Movie Decoder before 6.5.3 build 185404, VMware Workstation 6.5.x before 6.5.3 build 185404 or VMware Player 2.5.x before 2.5.3 build 185404 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted AVI file that triggers heap memory corruption. Successful exploitation allow remote attackers to ...


Pages:      Start    1202    1203    1204    1205    1206    1207    1208    1209    1210    1211    1212    1213    1214    1215    ..   1218

© 2013 SecPod Technologies