[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

The host is installed with LibreOffice 7.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in the crafted .ppt file. Successful exploitation allows a remote attacker to cause a denial of service.

The host is installed with Apache HTTP Server 2.4.x through 2.4.37 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the mod_session expiry time check issue. Successful exploitation could allow attackers to ignore session expiry time and gain access to the application.

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Core RDBMS accessible data and unauthorized ability to cause a partial denial ...

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Oracle Applications DBA component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Oracle Applications DBA accessible data and unauthorized ability to cause a ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Oracle Applications DBA component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Oracle Applications DBA accessible data and unauthorized ability ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to read a subset of Core RDBMS accessible data.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Java VM component issue. Successful exploitation allows an attacker to takeover the Java VM.

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Database Gateway for ODBC component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Database Gateway for ODBC accessible data and unauthorized ability to cause a p ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Core RDBMS accessible data.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Database Gateway for ODBC component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Database Gateway for ODBC accessible data as well as unauth ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1485

© SecPod Technologies