[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2 or 12.2.1.3 and is prone to a remote security vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Ser ...

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote unspecified vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to perform an unauthorized update, insert or delete access to some of Oracle WebLogic Serve ...

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows unauthenticated attacker to takeover an Oracle WebLogic Server.

A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could the ...

An elevation of privilege vulnerability exists when Microsoft Publisher fails to utilize features that lock down the Local Machine zone when instantiating OLE objects. An attacker who successfully exploited the vulnerability could force arbitrary code to be executed in the Local Machine zone. To exploit the vulnerability, the attacker could send a specially crafted Publisher document to a victim. ...

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle SAML component issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle console component issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle JSF component issue. Successful exploitation allows an attacker to access data, modify data, and partially deny service.

The host is installed with oracle webLogic server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle WLS core components issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS-Web services component issue. Successful exploitation allows an attacker with network access via HTTP to compromise Oracle WebLogic Server.


Pages:      Start    3056    3057    3058    3059    3060    3061    3062    3063    3064    3065    3066    3067    3068    3069    ..   3159

© SecPod Technologies