[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Microsoft ASP.NET MVC 2, 3 or 4 and it is prone a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a crafted web page. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with OpenSSL and is prone to lattice calculation and timing attack vulnerability. A flaw is present in elliptic curve cryptography (ECC) subsystem, which fails to properly implement curves over binary fields. Successful exploitation allow context-dependent attackers to determine private keys.

The host is installed with Winamp before 5.623 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fail to handle an AVI file with a crafted value for (1) the number of streams or (2) the size of the RIFF INFO chunk. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with RealPlayer before 15.0.4.53 or RealPlayer SP 1.0 through 1.1.5 and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly parse ASMRuleBook data in RealMedia files. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with VMware Workstation 15.x before 15.5.1, VMware Player 15.x before 15.5.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an issue in vmnetdhcp. Successful exploitation may allow attacker on a guest VM to disclose sensitive information by leaking memory from the host process.

The host is installed with Oracle Java SE 5.0 Update 17 or earlier or 6 Update 12 or earlier and is prone to Multiple unspecified vulnerabilities. A flaw is present in the applications, which fails to properly handle vectors related to temporary font files. Successful exploitation allows remote attackers to cause a denial of service.


Pages:      Start    1357    1358    1359    1360    1361    1362    1363    1364    1365    1366    1367    1368    1369    1370    ..   1516

© SecPod Technologies