[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15027 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 or 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to WLS Core Components. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.0 or 12.2.1.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the core components issue. Successful exploitation allows an unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2 or 12.2.1.3 and is prone to a remote security vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Ser ...

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote unspecified vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to perform an unauthorized update, insert or delete access to some of Oracle WebLogic Serve ...

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows unauthenticated attacker to takeover an Oracle WebLogic Server.

A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could the ...

An elevation of privilege vulnerability exists when Microsoft Publisher fails to utilize features that lock down the Local Machine zone when instantiating OLE objects. An attacker who successfully exploited the vulnerability could force arbitrary code to be executed in the Local Machine zone. To exploit the vulnerability, the attacker could send a specially crafted Publisher document to a victim. ...

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle SAML component issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle console component issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle JSF component issue. Successful exploitation allows an attacker to access data, modify data, and partially deny service.


Pages:      Start    1435    1436    1437    1438    1439    1440    1441    1442    1443    1444    1445    1446    1447    1448    ..   1502

© SecPod Technologies