[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26684 Download | Alert*

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle console component issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle JSF component issue. Successful exploitation allows an attacker to access data, modify data, and partially deny service.

The host is installed with oracle webLogic server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle WLS core components issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS-Web services component issue. Successful exploitation allows an attacker with network access via HTTP to compromise Oracle WebLogic Server.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS Core components issue. Successful exploitation allows an attacker to gain elevated privileges.

The host is installed with WSO2 API Manager 2.6.0 and is prone to an SSRF attack vulnerability. A flaw is present in the application, which fails to properly handle an issue caused by the existence of the file:// wrapper. Successful exploitation could allow attackers to force the application to perform requests to workstation or enumerate files.

The host is installed with HP Access Control before 16.7 and is prone to a privilege escalation vulnerability. A flaw is present in application, which fails to properly handle unspecified vectors. Successful exploitation may allow an attacker to obtain elevated privileges.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle Console component issue. Successful exploitation could result in takeover of Oracle WebLogic Server.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle Web services component issue. Successful exploitation could result in takeover of Oracle WebLogic Server.

The host is installed with oracle WebLogic through 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle Sample apps component issue. Successful exploitation could result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Ser ...


Pages:      Start    2602    2603    2604    2605    2606    2607    2608    2609    2610    2611    2612    2613    2614    2615    ..   2668

© SecPod Technologies