[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0 or 12.2.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to WLS Core Components. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0 or 12.2.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to JavaServer Faces. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 12.1.3.0 or 12.2.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to WLS Core Components. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 or 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to WLS Core Components. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.0 or 12.2.1.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the core components issue. Successful exploitation allows an unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2 or 12.2.1.3 and is prone to a remote security vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Ser ...

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote unspecified vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to perform an unauthorized update, insert or delete access to some of Oracle WebLogic Serve ...

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows unauthenticated attacker to takeover an Oracle WebLogic Server.

A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could the ...

An elevation of privilege vulnerability exists when Microsoft Publisher fails to utilize features that lock down the Local Machine zone when instantiating OLE objects. An attacker who successfully exploited the vulnerability could force arbitrary code to be executed in the Local Machine zone. To exploit the vulnerability, the attacker could send a specially crafted Publisher document to a victim. ...


Pages:      Start    1456    1457    1458    1459    1460    1461    1462    1463    1464    1465    1466    1467    1468    1469    ..   1516

© SecPod Technologies