The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the Console issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.
The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the core components issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.
The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the core components issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.
The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the Core Components issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.
The host is installed with WordPress Simple Ecommerce Shopping Cart Plugin of version through 2.2.5, is prone to a remote code execution vulnerability. It does not check for the uploaded downloadable digital product file, allowing any file, such as PHP to be uploaded by an administrator. Furthermore, as there is no CSRF in place, attackers could also make a logged admin upload a malicious PHP file ...
In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932
The host is installed with Google Chrome before 73.0.3683.75 and is prone to an out of bounds access vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
The host is installed with Google Chrome before 73.0.3683.75 and is prone to an out of bounds access vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
The host is installed with Google Chrome before 73.0.3683.75 and is prone to an out of bounds access vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
The host is installed with Google Chrome before 73.0.3683.75 and is prone to an out of bounds access vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.