[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with oracle webLogic server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle WLS core components issue. Successful exploitation allows an attacker to partially access and modify data.

The host is installed with oracle webLogic through 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS-Web services component issue. Successful exploitation allows an attacker with network access via HTTP to compromise Oracle WebLogic Server.

The host is installed with oracle webLogic through 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS Core components issue. Successful exploitation allows an attacker to gain elevated privileges.

The host is installed with WSO2 API Manager 2.6.0 and is prone to an SSRF attack vulnerability. A flaw is present in the application, which fails to properly handle an issue caused by the existence of the file:// wrapper. Successful exploitation could allow attackers to force the application to perform requests to workstation or enumerate files.

The host is installed with oracle WebLogic through 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the application container - JavaEE issue. Successful exploitation allows an attacker to takeover Oracle WebLogic Server.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle WLS Core components issue. Successful exploitation allows an attacker to gain unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized ...

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS Core components issue. Successful exploitation allows an attacker to gain unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as unauthorized ...

The host is installed with Bamboo CI server 2.4.0 before 2.5.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in the SAML Single Sign On plugin. Successful exploitation could allow locally disabled users to reactivate their accounts just by browsing the affected instance.

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the ...

The host is installed with Serv-U FTP Server before 11.1.0.5 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly validate the given input. Successful exploitation allows remote attackers to disclose potentially sensitive information and manipulate certain data.


Pages:      Start    1365    1366    1367    1368    1369    1370    1371    1372    1373    1374    1375    1376    1377    1378    ..   1429

© SecPod Technologies