[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15029 Download | Alert*

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to sound and unspecified APIs. Successful exploitation allow remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Google Chrome before 76.0.3809.100 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 76.0.3809.100 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Apache Subversion 1.4.0 before 1.8.17 or 1.9.0 before 1.9.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an issue in mod_dontdothat module. Successful exploitation could allow remote attackers to cause the targeted process to consume an excessive amount of CPU resources or memory.

The host is installed with Apache Subversion 1.0.x before 1.8.19 or 1.9.x before 1.9.7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a maliciously constructed SVN URL. Successful exploitation could allow remote attackers to cause SVN to run an arbitrary shell command.

The host is installed with Calibre version 3.18 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted .pickle file. Successful exploitation could allow remote attackers to execute arbitrary code via a crafted .pickle file.

The host is installed with Calibre version before 2.75 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted epub file with javaScript. Successful exploitation could allow remote attackers to to read arbitrary files.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in application, which fails to properly handle vectors related to security. Successful exploitation allow local users to affect confidentiality.

The host is installed with PHP and is prone to use-after-free vulnerability. A flaw is present in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 where objects that are unreferenced by __set, __get, __isset, and __unset methods are freed early, which leads to heap memory corruption. Successful exploitation will allow attackers to cause a denial of service condition.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality.


Pages:      Start    1037    1038    1039    1040    1041    1042    1043    1044    1045    1046    1047    1048    1049    1050    ..   1502

© SecPod Technologies