[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254492

 
 

909

 
 

198437

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26429 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Core Components. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Core Components. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Core Components. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0 or 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Web Services. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0 or 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Web Services. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0 or 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Web Services. Successful exploitation can cause unspecified impact.

The host is installed with MariaDB before 10.1.48 or 10.2.x before 10.2.35 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue with named pipes. Successful exploitation allows remote authenticated users to access SQL requests and responses and execute SQL commands.

The host is installed with Apache CouchDB before 1.0.4, 1.1.x before 1.1.2 or 1.2.x before 1.2.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle the partition2 function in mochiweb_util.erl. Successful exploitation could allow remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.

The host is installed with FactoryTalk Linx 6.00, 6.10 or 6.11 and is prone to a path traversal vulnerability. A flaw is present in application, which fails to properly handle an exposed API call. Successful exploitation may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive.

The host is installed with Microsoft Active Directory and is prone to a denial of service vulnerability. A flaw is present in Active Directory, which fails to handle multiple machine accounts created by an authenticated attacker. An attacker who successfully exploited this vulnerability could cause the Active Directory service to become non-responsive.


Pages:      Start    2590    2591    2592    2593    2594    2595    2596    2597    2598    2599    2600    2601    2602    2603    ..   2642

© SecPod Technologies