The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the Application Container issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.
The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.4.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the Console issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.
The host is installed with oracle WebLogic through 10.3.6.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the core components issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.
The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.4.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the console issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.
The host is installed with Google Chrome before 25.0.1364.160 or Apple iTunes before 11.0.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle vectors that leverage type confusion. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Google Chrome before 20.0.1132.43 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle Metro DLL. Successful exploitation allows local users to gain privileges via a Trojan horse Metro DLL in the current working directory.
The host is installed with Google Chrome before 75.0.3770.142 and is prone to an out of bounds memory access vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 51.0.2704.63 and is prone to an out-of-bounds Read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 69.0.3497.81 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 49.0.2623.87 and is prone to a denial of service vulnerability. A flaw is present in the application, which fail to handle a crafted JPEG 2000 data. Successful exploitation allows remote attackers to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspecified other impact.