[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31160 Download | Alert*

The host is installed with Oracle Java SE 7 through update 11, 6 through Update 38, 5.0 through Update 38, 1.4.2_40 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JSSE. Successful exploitation could allow attackers to affect confidentiality and integrity.

The host is installed with Oracle Java SE 7 Update 13 or earlier or 6 Update 39 or earlier or 5 update 39 or earlier and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 Update 13 or earlier and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java SE 7 Update 13 or earlier and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Apache HTTP Server 2.2.x before 2.2.24-dev or 2.4.x before 2.4.4 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted string. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apache HTTP Server 2.2.x before 2.2.24-dev or 2.4.x before 2.4.4 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving hostnames and URIs in the mod_imagemap, mod_info, mod_ldap, mod_proxy_ftp and mod_status modules. Successful exploitation allows remote attackers to inject a ...

The host is installed with Oracle Java SE 7 Update 15 or earlier, 6 Update 41 or earlier or 5.0 Update 40 or earlier and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors that trigger a read or write of arbitrary memory in the JVM. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Oracle Java SE 7 Update 15 or earlier, 6 Update 41 or earlier or 5.0 Update 40 or earlier and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted applet or Web Start application. Successful exploitation allows attackers to cause arbitrary code to be executed on the target user's system.

MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home ...

mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.


Pages:      Start    1465    1466    1467    1468    1469    1470    1471    1472    1473    1474    1475    1476    1477    1478    ..   3115

© SecPod Technologies