[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26013 Download | Alert*

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 or earlier or 1.4.2_37 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle CORBA component. Successful exploitation allows remote attackers to affect integrity.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Swing. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 or earlier or 1.4.2_37 or JavaFX 2.1 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 or earlier or 1.4.2_37 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle CORBA component. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Opera before 11.65 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to ensure that keyboard sequences are associated with a visible window. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web site, related to a "hidden keyboard ...

The host is installed with Opera before 11.65 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly restrict the opening of a pop-up window in response to the first click of a double-click action. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web ...

The host is installed with Opera before 11.65 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the reading of JSON strings. Successful exploitation allows remote attackers to perform cross-domain loading of JSON resources and consequently obtain sensitive information via a crafted web site.

The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during unusually timed changes to this field. Successful exploitation allows remote attackers to conduct spoofing attacks via vectors involving navigation, reloads, and redirects.


Pages:      Start    1246    1247    1248    1249    1250    1251    1252    1253    1254    1255    1256    1257    1258    1259    ..   2601

© SecPod Technologies