[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15029 Download | Alert*

The host is installed with Adobe AIR, Flash Player or Reader or Acrobat and is prone to remote code execution vulnerability. A flaw is present in authplay.dll, which fails to handle crafted flash content. Successful exploitation could allow remote attackers to execute arbitrary code or obtain sensitive information or cause denial of service.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment. Successful exploitation allow the attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment. Successful exploitation allow the remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to networking. Successful exploitation allow the remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to install. Successful exploitation allow remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment component. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to sound and unspecified APIs. Successful exploitation allow remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to sound and unspecified APIs. Successful exploitation allow remote attackers to affect confidentiality, integrity, and availability.

The host is installed with PHP and is prone to vulnerability. A flaw is present in the iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 where the function skips the headers that are unrecognized by the iconv and mbstring implementations. Successful exploitation allows attackers to trigger an incomplete output array via a crafted Subject header in an e-mail message.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to swing. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.


Pages:      Start    1031    1032    1033    1034    1035    1036    1037    1038    1039    1040    1041    1042    1043    1044    ..   1502

© SecPod Technologies