[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115228

 
 

909

 
 

90132

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 13057 Download | Alert*

The host is installed with VideoLAN VLC media player before 2.0.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted OGG file. Successful exploitation could allow attackers to crash the service.

The host is installed with Oracle Java SE 7 Update 7 or earlier or 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 through Update 11, 6 through Update 38 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 through Update 11, 6 through Update 38 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Scripting. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with MySQL 5.5.0 through 5.5.25 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with MySQL 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to MySQL Client. Successful exploitation allows remote authenticated users to affect confidentiality.

The host is installed with MySQL 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to MySQL Client. Successful exploitation allows remote authenticated users to affect integrity and availability.

The host is installed with MySQL 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to server. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 or earlier, 6 Update 35 or earlier or 5.0 Update 36 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Google Chrome before 22.0.1229.79 and is prone to multiple unspecified vulnerabilities. The flaw are present in the application, which fails to handle a crafted document. Successful exploitation allows remote attackers to crash the service.


Pages:      Start    1246    1247    1248    1249    1250    1251    1252    1253    1254    1255    1256    1257    1258    1259    ..   1305

© SecPod Technologies