[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15029 Download | Alert*

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality.

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to JDBC. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to HotSpot. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with VideoLAN VLC media player through 3.0.7.1 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in modules/demux/mp4/mp4.c file. Successful exploitation could allow remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 75.0.3770.142 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 75.0.3770.142 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation may lead to exposure of sensitive information.

The host is installed with Oracle VM VirtualBox 5.2.x before 5.2.32 or 6.0.10 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core (OpenSSL). Successful exploitation allows attackers to affect confidentiality and integrity.

The host is installed with Oracle VM VirtualBox 5.2.x before 5.2.32 or 6.0.10 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle VM VirtualBox 5.2.x before 5.2.32 or 6.0.10 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect availability.


Pages:      Start    1032    1033    1034    1035    1036    1037    1038    1039    1040    1041    1042    1043    1044    1045    ..   1502

© SecPod Technologies