[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26443 Download | Alert*

The host is installed with Oracle Java SE 5.0 before update 22 or 6 before update 17 and is prone to multiple unspecified vulnerabilities. A flaw is present in the applications, which does not properly handle unspecified vectors. Successful exploitation have unknown impact and remote attack vectors, related to "information leaks in mutable variables".

The host is installed with Oracle Java SE 5.0 before update 22 or 6 before update 17 and is prone to multiple unspecified vulnerabilities. A flaw is present in the applications, which does not properly handle unspecified vectors. Successful exploitation have unknown impact and remote attack vectors, related to "information leaks in mutable variables".

The host is installed with Oracle Java SE 5.0 before update 22 or 6 before update 17 and is prone to unspecified vulnerability. A flaw is present in the applications, which does not properly handle vectors related to handling of zoneinfo (aka tz) files. Successful exploitation allows remote attackers to determine the existence of local files.

The host is installed with Oracle Java SE 5.0 before update 22 or 6 before update 17 and is prone to denial of service vulnerability. A flaw is present in the applications, which does not properly handle a BMP file containing a link to a UNC share pathname for an International Color Consortium (ICC) profile file. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Oracle Java SE JDK and JRE 6 Update 18 or earlier or 5.0 Update 23 or earlier and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE JDK and JRE 6 Update 21 or earlier, 5.0 Update 25 or earlier or 1.4.2_27 or earlier and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 5 before Update 20 or 6 before Update 15 and is prone to information disclosure vulnerability. A flaw is present in the applications, which fails to properly handle vectors involving static variables. Successful exploitation might allow context-dependent attackers to obtain sensitive information.

The host is installed with Oracle Java SE 6 before Update 15 and is prone to security bypass vulnerability. A flaw is present in the applications, which does not properly enforce OpenType checks. Successful exploitation allows context-dependent attackers to bypass intended access restrictions.

The host is installed with Oracle Java SE 5.0 before Update 20 or 6 before Update 15 and is prone to information disclosure vulnerability. A flaw is present in the applications, which does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications. Successful exploitation allows context-dependent attackers to obtain sensitive information by readi ...

The host is installed with Oracle Java SE 5.0 before Update 20 or 6 before Update 15 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle unspecified vectors. Successful exploitation allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application.


Pages:      Start    1571    1572    1573    1574    1575    1576    1577    1578    1579    1580    1581    1582    1583    1584    ..   2644

© SecPod Technologies