[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10896 Download | Alert*

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2 or 12.2.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Oracle SSL API issue. Successful exploitation allows unauthorized access to critical data or complete access to all Oracle SSL API accessible data.

The host is installed with Oracle Database Server 18c and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle the GeoRaster (OpenJPG). Successful exploitation allows an attacker to takeover the GeoRaster (OpenJPG).

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to takeover the Core RDBMS.

The host is installed with Elasticsearch 6.2.0 before 6.2.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which allows attackers to make use of the SAML Identity Provider to impersonate a legitimate user. On successful exploitation, an attacker might be able to register an account with an identifier that shares a suffix with a legitimate account.

The host is installed with Elasticsearch 6.2.0 before 6.2.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which allows attackers to make use of the SAML Identity Provider to impersonate a legitimate user. On successful exploitation, an attacker might be able to register an account with an identifier that shares a suffix with a legitimate account.

The host is installed with IBM DB2 9.7 through FP11, 10.1 through FP6, 10.5 through FP10 or 11.1 before FP5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the boundary checks issue. Successful exploitation allows an authenticated local attacker to execute arbitrary code on the system as root.

The host is installed with kibana before 6.8.2 or 7.x before 7.2.1 and is prone to a server side request forgery vulnerability. A flaw is present in the application, which fails to handle a issue in the graphite integration for timelion visualizer. Successful exploitation allows attackers to access external URL resources as the kibana process on the host system.

The host is installed with kibana before 6.8.2 or 7.x before 7.2.1 and is prone to a server side request forgery vulnerability. A flaw is present in the application, which fails to handle a issue in the graphite integration for timelion visualizer. Successful exploitation allows attackers to access external URL resources as the kibana process on the host system.

The host is installed with IBM DB2 9.7 before FP11, 10.1 before FP6, 10.5 before FP10 and 11.1 before FP5 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application which uses 3DES cipher that has some known weaknesses. Successful exploitation allows an attacker to decrypt highly sensitive information.

The host is installed with IBM DB2 9.7 before FP11, 10.1 before FP6, 10.5 before FP10 and 11.1 before FP5 and is prone to a buffer overflow vulnerability. A flaw is present in the application which fails to handle unspecified vectors. Successful exploitation allows an attacker to escalate their privileges.


Pages:      Start    696    697    698    699    700    701    702    703    704    705    706    707    708    709    ..   1089

© SecPod Technologies