The host is installed with Oracle Java SE 5.0 before update 22 and 6 before update 17 and is prone to unspecified vulnerability. A flaw is present in the applications, which fails to properly handle a certain test suite. Successful exploitation allows remote attackers to cause a denial of service.
The host is installed with Oracle Java SE 6 before update 17 and is prone to unspecified vulnerability. A flaw is present in the applications, which does not properly handle vectors related to a "regression". Successful exploitation has unspecified impact and attack vectors.
The host is installed with Oracle Weblogic Server 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unauthenticated network access via T3. Successful exploitation allows an attacker to take over Oracle WebLogic Server.
The host is installed with OpenAFS before 1.6.24 and is prone to an denial of service vulnerability. The flaw is present in the application, which fails to handle unserialized RPC calls. Successful exploitation allow attackers to perform denial of service attack.
The host is installed with Oracle VM VirtualBox before 5.1.32 or 5.2.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.
The host is installed with Oracle VM VirtualBox before 5.1.32 or 5.2.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.
The host is installed with Oracle VM VirtualBox before 5.1.32 or 5.2.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.
The host is installed with Oracle VM VirtualBox before 5.1.32 or 5.2.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.
The host is installed with Oracle VM VirtualBox before 5.1.32 or 5.2.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.