[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before, 5.0 Update 33 or before and 1.4.2_35 or before and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to take complete control of the affected system or ex ...

The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before, 5.0 Update 33 or before and 1.4.2_35 or before and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to cause a partial denial of service condition.

The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 and before and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to crash the service.

The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle malicious HTTP requests. Successful exploitation could result in unauthorized ability to cause a hang or frequently repeatable crash.

The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before, 5.0 Update 33 or before and 1.4.2_35 or before and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to update, insert or delete access to some Java Runti ...

The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with MySQL 5.1.60 or earlier or 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow attackers to crash the service.


Pages:      Start    1580    1581    1582    1583    1584    1585    1586    1587    1588    1589    1590    1591    1592    1593    ..   3159

© SecPod Technologies