The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to sound and unspecified APIs. Successful exploitation allow remote attackers to affect confidentiality, integrity, and availability.
The host is installed with Google Chrome before 76.0.3809.100 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 76.0.3809.100 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Apache Subversion 1.4.0 before 1.8.17 or 1.9.0 before 1.9.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an issue in mod_dontdothat module. Successful exploitation could allow remote attackers to cause the targeted process to consume an excessive amount of CPU resources or memory.
The host is installed with Apache Subversion 1.0.x before 1.8.19 or 1.9.x before 1.9.7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a maliciously constructed SVN URL. Successful exploitation could allow remote attackers to cause SVN to run an arbitrary shell command.
The host is installed with Calibre version 3.18 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted .pickle file. Successful exploitation could allow remote attackers to execute arbitrary code via a crafted .pickle file.
The host is installed with Calibre version before 2.75 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted epub file with javaScript. Successful exploitation could allow remote attackers to to read arbitrary files.
The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in application, which fails to properly handle vectors related to security. Successful exploitation allow local users to affect confidentiality.
The host is installed with PHP and is prone to use-after-free vulnerability. A flaw is present in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 where objects that are unreferenced by __set, __get, __isset, and __unset methods are freed early, which leads to heap memory corruption. Successful exploitation will allow attackers to cause a denial of service condition.
The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality.