[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31456 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to WLS Core Components. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to EJB Container. Successful exploitation can cause unspecified impact.

The host is installed with IBM DB2 10.5 before FP11, 11.1 before FP5 and 11.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application which fails to handle improper bounds checking. Successful exploitation allows a local attacker to execute arbitrary code on the system with root privileges.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to Web Services. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to Web Services. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to Web Services. Successful exploitation can cause unspecified impact.

An elevation of privilege vulnerability exists when Visual Studio fails to properly validate hardlinks while extracting archived files. An attacker who successfully exploited this vulnerability could overwrite arbitrary files in the security context of the local system. To exploit this vulnerability, an attacker would need to trick an elevated user into downloading a malicious package, either by g ...

Host is installed with Kaspersky Anti-Virus 2019 before Patch I and Patch J or Kaspersky Anti-Virus 2020 before Patch E and Patch F and is prone to an information Exposure vulnerability. A flaw is present in the application, which fails to properly handle the web protection component due to a bug in its implementation. Successful exploitation allows an attacker to remotely disclosure of some infor ...

The host is installed with Nvidia graphics driver with 470.x prior to 471.41 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to properly handle unspecified vectors. Successful exploitation could lead to data loss or denial of service.

The host is installed with Apache Subversion 1.8.0 before 1.8.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a symlink attack. Successful exploitation could allow local users to gain privileges via a symlink attack on the pid file.


Pages:      Start    3065    3066    3067    3068    3069    3070    3071    3072    3073    3074    3075    3076    3077    3078    ..   3145

© SecPod Technologies