[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with Windows Server 2003, Server 2008, Vista, Windows 7, Server 2008 R2, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle file association. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Windows Vista, Server 2008, Windows 7, Server 2008 R2, Windows 8, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle passwords being distributed by Active Directory. Successful exploitation could allow attackers to decrypt the passwords and use ...

The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application or applet. Successful exploitation could allow attackers to gain privileges.

The host is installed with JRE or JDK 5.0 Update 13 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application or applet. Successful exploitation could allow attackers to gain privileges.

The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to XSLT transforms. Successful exploitation could allow attackers to cause a denial of service (JRE crash).

The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application. Successful exploitation could allow attackers to gain privileges.

The host is installed with Sun JDK or JRE 6 Update 1 or earlier or 5.0 Update 13 or earlier and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle an untrusted (1) application or (2) applet,. Successful exploitation could allow attackers to gain privileges .

The host is installed with Sun Java Runtime Environment JDK or JRE 6 Update 3 or earlier and is prone to a XML External entity attack vulnerability. A flaw is present in the applications, which processes external entity references even when the "external general entities" property is false,. Successful exploitation could allow attackers to conduct XML external entity (XXE) attacks and cause a deni ...

The host is installed with Microsoft XML Core Services 3.0 on Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 or Microsoft XML Core Services 6.0 on Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1 or Server 2008 R2 SP1 and is prone to information disclosure vulnerability. A f ...

The host is installed with VMware Workstation 7.1.x before 7.1.4 or VMware Player 3.1.x before 3.1.4 and is prone to unauthorized modification and denial of service. A flaw is present in the application, which is triggered when a Solaris or FreeBSD guest OS is used. Successful exploitation could allow the guest OS users to do unauthorized modification of guest OS files and directories and create d ...


Pages:      Start    1410    1411    1412    1413    1414    1415    1416    1417    1418    1419    1420    1421    1422    1423    ..   1483

© SecPod Technologies