[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 50 Download | Alert*

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an insufficient information vulnerability. A flaw is present in the application, which fails to handle the Java VM. Successful exploitation allows an attacker to takeover the Java VM.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an insufficient information vulnerability. A flaw is present in the application, which fails to handle the Data Pump. Successful exploitation allows an attacker to takeover the Data Pump.

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an insufficient information vulnerability. A flaw is present in the application, which fails to handle the GeoRaster (OpenJPG). Successful exploitation allows an attacker to takeover the Oracle database - enterprise edition.

The host is installed with Oracle Database Server 18c and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle the GeoRaster (OpenJPG). Successful exploitation allows an attacker to takeover the GeoRaster (OpenJPG).

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Core RDBMS accessible data and unauthorized ability to cause a partial denial ...

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Oracle Applications DBA component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Oracle Applications DBA accessible data and unauthorized ability to cause a ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Oracle Applications DBA component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Oracle Applications DBA accessible data and unauthorized ability ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to read a subset of Core RDBMS accessible data.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Java VM component issue. Successful exploitation allows an attacker to takeover the Java VM.

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Database Gateway for ODBC component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Database Gateway for ODBC accessible data and unauthorized ability to cause a p ...


Pages:      Start    1    2    3    4    ..   4

© SecPod Technologies