[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26604 Download | Alert*

The host is installed with Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle remote untrusted Java Web Start applications and untrusted Java applets. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle remote untrusted Java Web Start applications and untrusted Java applets. Successful exploitation could allow attackers to affect confidentiality ...

The host is installed with Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, or JRockit R28.1.4 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle remote untrusted Java Web Start applications and untrusted Java applets. Successful exploitation could allow attackers to affect confidentiality ...

The host is installed with Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier or JRockit R28.1.4 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle remote untrusted Java Web Start applications and untrusted Java applets. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Apache Tomcat 5.5.x before 5.5.34 or 6.x before 6.0.33 or 7.x before 7.0.12 and is prone to security bypass vulnerability. A flaw is present in the application, which does not have the expected countermeasures against replay attacks. Successful exploitation allows remote attackers to bypass intended access restrictions.

The host is installed with PHP 5.3.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which performs strndup operations on untrusted string data. Successful exploitation could allow remote attackers to crash the service.

The host is installed with PHP 5.3.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted input to an application that attempts to perform Tidy::diagnose operations on invalid objects. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Apple Safari before 5.0.5 or Apple iTunes before 10.5 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle images with an embedded ColorSync profile. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 10.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Advanced Audio Coding (AAC) stream. Successful exploitation could allow attackers to overflow the buffer.

The host is installed with Oracle MySQL 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which allows authenticated users to partially affect confidentiality and integrity. Successful exploitation allows remote attackers to disclose certain data and cause denial of service.


Pages:      Start    1202    1203    1204    1205    1206    1207    1208    1209    1210    1211    1212    1213    1214    1215    ..   2660

© SecPod Technologies