[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15134 Download | Alert*

The host is installed with Google Chrome before 105.0.5195.125 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 104.0.5112.79 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 104.0.5112.79 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Core RDBMS accessible data and unauthorized ability to cause a partial denial ...

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Oracle Applications DBA component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Oracle Applications DBA accessible data and unauthorized ability to cause a ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Oracle Applications DBA component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Oracle Applications DBA accessible data and unauthorized ability ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to read a subset of Core RDBMS accessible data.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Java VM component issue. Successful exploitation allows an attacker to takeover the Java VM.

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Database Gateway for ODBC component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Database Gateway for ODBC accessible data and unauthorized ability to cause a p ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS component issue. Successful exploitation allows an attacker to update, insert or delete access to some of Core RDBMS accessible data.


Pages:      Start    1098    1099    1100    1101    1102    1103    1104    1105    1106    1107    1108    1109    1110    1111    ..   1513

© SecPod Technologies