[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1505 Download | Alert*

The host is installed with Oracle Java SE through 8u401 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX. Successful exploitation allows attackers to affect integrity.

Java Development Kit 22 (64 bit) is installed

The host is installed with Oracle Java SE through 8u401 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (WebKitGTK). Successful exploitation allows attackers to affect confidentiality, integrity and availability.

Microsoft Excel Remote Code Execution Vulnerability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Thread Pooling. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Client: mysqldump. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Group Replication Plugin. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DDL. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.35 or 8.2.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Audit Plug-in. Successful exploitation allows attackers to affect availability.


Pages:      Start    87    88    89    90    91    92    93    94    95    96    97    98    99    100    ..   150

© SecPod Technologies