[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12531 Download | Alert*

The host is installed with Oracle Weblogic Server 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unauthenticated network access via HTTP. Successful exploitation allows an attacker to take over Oracle WebLogic Server.

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on ...

The host is installed with oracle webLogic server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle specially crafted binary payloads. Successful exploitation allows an attacker to execute arbitrary code in the context of the logger application.

The host is installed with OpenSSL version 1.0.2b to 1.0.2m or Oracle MySQL Server through 5.6.38 or through 5.7.20 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle exceptional conditions. Successful exploitation allows remote attackers to bypass security restrictions and perform unauthorized actions.

The host is installed with Oracle VM VirtualBox before 5.1.32 or 5.2.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core (OpenSSL). Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle MySQL Server through 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Memcached. Successful exploitation allows attackers to affect Integrity and Availability.

The host is installed with Oracle Java SE through 6u161, 7u151 or 8u144 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Util (zlib). Successful exploitation allows attackers to affect Integrity.

The host is installed with Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36 or 8.5.x before 8.5.3 and is prone to a denial of service vulnerability. A flaw is present in the MultipartStream class in Apache Commons Fileupload, which fails to handle a long boundary string. Successful exploitation allows remote attackers to cause a denial of service (CPU consumption).

The host is installed with OpenSSL 1.0.1 before 1.0.1t or 1.0.2 before 1.0.2h and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted ASN.1 data. Successful exploitation allows remote attackers to cause allocation of large amounts of memory potentially consuming excessive resources or exhausting memory.

The host is installed with OpenSSL 1.0.1 before 1.0.1t or 1.0.2 before 1.0.2h and is prone to a heap overflow vulnerability. A flaw is present in the application, which fails to handle very large amounts of input data. Successful exploitation allows remote attackers to supply very large amounts of input data after a previous call to EVP_EncryptUpdate() with a partial block then a length check can ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1253

© SecPod Technologies