[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2 or 12.2.0.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the core RDBMS component issue. Successful exploitation allows an attacker to obtain sensitive information resulting in a high confidentiality impact using unknown attack vectors.

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1 or 18c and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS issue. Successful exploitation allows an attacker to perform an unauthorized update, insert or delete access to some of Core RDBMS accessible data.

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS (jackson-databind) issue. Successful exploitation allows an attacker to perform an unauthorized update, insert or delete access to some of Core RDBMS accessible data and unauthorized ability to ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS (jackson-databind) issue. Successful exploitation allows an attacker to perform an unauthorized update, insert or delete access to some of Core RDBMS accessible data and unauthorized ability to ...

The host is installed with Oracle Database Server 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the core RDBMS component issue. Successful exploitation allows an attacker to cause a unauthorized access to critical data or complete access to all Core RDBMS accessible data as well as unauthorized update, inser ...

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the java VM component issue. Successful exploitation allows an attacker to cause a unauthorized creation, deletion or modification access to critical data or all Java VM accessible data and unauthor ...

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS issue. Successful exploitation allows an attacker to perform an unauthorized update, insert or delete access to some of Core RDBMS accessible data.

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS issue. Successful exploitation allows an attacker to have an unauthorized read access to a subset of Core RDBMS accessible data.

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS issue. Successful exploitation allows an attacker to have an unauthorized read access to a subset of Core RDBMS accessible data.

The host is installed with Oracle Database Server 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Core RDBMS issue. Successful exploitation allows an attacker to have an unauthorized read access to a subset of Core RDBMS accessible data.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1486

© SecPod Technologies