The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before, 5.0 Update 33 or before and 1.4.2_35 or before and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to take complete control of the affected system or ex ...
The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before, 5.0 Update 33 or before and 1.4.2_35 or before and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to cause a partial denial of service condition.
The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 and before and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to crash the service.
The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle malicious HTTP requests. Successful exploitation could result in unauthorized ability to cause a hang or frequently repeatable crash.
The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before, 5.0 Update 33 or before and 1.4.2_35 or before and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to update, insert or delete access to some Java Runti ...
The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.
The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.
The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availability.
The host is installed with MySQL 5.1.60 or earlier or 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availability.
The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow attackers to crash the service.