The host is installed with Visual Studio code before 1.82.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified handle. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Sound. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.