[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0 or 12.2.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to WLS Core Components. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0 or 12.2.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to WLS Core Components. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0 or 12.2.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to JavaServer Faces. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 12.1.3.0 or 12.2.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to WLS Core Components. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 or 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to WLS Core Components. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.0 or 12.2.1.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the core components issue. Successful exploitation allows an unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2 or 12.2.1.3 and is prone to a remote security vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Ser ...

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote unspecified vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to perform an unauthorized update, insert or delete access to some of Oracle WebLogic Serve ...

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows unauthenticated attacker to takeover an Oracle WebLogic Server.

A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could the ...


Pages:      Start    1436    1437    1438    1439    1440    1441    1442    1443    1444    1445    1446    1447    1448    1449    ..   1484

© SecPod Technologies