[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle console component issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle JSF component issue. Successful exploitation allows an attacker to access data, modify data, and partially deny service.

The host is installed with oracle webLogic server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle WLS core components issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS-Web services component issue. Successful exploitation allows an attacker with network access via HTTP to compromise Oracle WebLogic Server.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS Core components issue. Successful exploitation allows an attacker to gain elevated privileges.

The host is installed with WSO2 API Manager 2.6.0 and is prone to an SSRF attack vulnerability. A flaw is present in the application, which fails to properly handle an issue caused by the existence of the file:// wrapper. Successful exploitation could allow attackers to force the application to perform requests to workstation or enumerate files.

The host is installed with oracle WebLogic through 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the application container - JavaEE issue. Successful exploitation allows an attacker to takeover Oracle WebLogic Server.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle WLS Core components issue. Successful exploitation allows an attacker to gain unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized ...

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS Core components issue. Successful exploitation allows an attacker to gain unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized ...

Host is installed with Kaspersky Anti-Virus 2019 before Patch I and Patch J or Kaspersky Anti-Virus 2020 before Patch E and Patch F and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle the web protection component due to a bug in its implementation. Successful exploitation allows an attacker to remotely disable such produc ...


Pages:      Start    1438    1439    1440    1441    1442    1443    1444    1445    1446    1447    1448    1449    1450    1451    ..   1485

© SecPod Technologies