[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on ...

The host is installed with WSO2 API Manager 2.6.0 and is prone to an SSRF attack vulnerability. A flaw is present in the application, which fails to properly handle an issue caused by the existence of the file:// wrapper. Successful exploitation could allow attackers to force the application to perform requests to workstation or enumerate files.

The host is installed with HP Access Control before 16.7 and is prone to a privilege escalation vulnerability. A flaw is present in application, which fails to properly handle unspecified vectors. Successful exploitation may allow an attacker to obtain elevated privileges.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle Console component issue. Successful exploitation could result in takeover of Oracle WebLogic Server.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle Web services component issue. Successful exploitation could result in takeover of Oracle WebLogic Server.

The host is installed with oracle WebLogic through 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle Sample apps component issue. Successful exploitation could result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Ser ...

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle EJB Container component issue. Successful exploitation could result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subse ...

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle Web services component issue. Successful exploitation could result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset ...

The host is installed with oracle WebLogic through 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the application container - JavaEE issue. Successful exploitation allows an attacker to takeover Oracle WebLogic Server.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle WLS Core components issue. Successful exploitation allows an attacker to gain unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized ...


Pages:      Start    2629    2630    2631    2632    2633    2634    2635    2636    2637    2638    2639    2640    2641    2642    ..   2688

© SecPod Technologies