Max CVSS | 10.0 | Min CVSS | 1.9 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-13990 | 7.5 |
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
|
15-10-2024 - 19:35 | 26-07-2019 - 19:15 | |
CVE-2020-2555 | 7.5 |
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows una
|
02-10-2024 - 14:24 | 15-01-2020 - 17:15 | |
CVE-2020-14644 | 7.5 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with n
|
19-09-2024 - 01:00 | 15-07-2020 - 18:15 | |
CVE-2016-9842 | 6.8 |
The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
|
28-08-2024 - 16:07 | 23-05-2017 - 04:29 | |
CVE-2018-11776 | 9.3 |
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time
|
25-07-2024 - 14:48 | 22-08-2018 - 13:29 | |
CVE-2020-1938 | 7.5 |
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available t
|
24-07-2024 - 14:23 | 24-02-2020 - 22:15 | |
CVE-2020-10969 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
|
03-07-2024 - 01:36 | 26-03-2020 - 13:15 | |
CVE-2020-11113 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
|
03-07-2024 - 01:36 | 31-03-2020 - 05:15 | |
CVE-2020-10673 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).
|
03-07-2024 - 01:36 | 18-03-2020 - 22:15 | |
CVE-2020-11111 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
|
03-07-2024 - 01:36 | 31-03-2020 - 05:15 | |
CVE-2020-11112 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
|
03-07-2024 - 01:36 | 31-03-2020 - 05:15 | |
CVE-2020-10672 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
|
03-07-2024 - 01:36 | 18-03-2020 - 22:15 | |
CVE-2020-10968 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).
|
03-07-2024 - 01:36 | 26-03-2020 - 13:15 | |
CVE-2018-8032 | 4.3 |
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
|
21-06-2024 - 19:15 | 02-08-2018 - 13:29 | |
CVE-2019-1547 | 1.9 |
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those case
|
21-06-2024 - 19:15 | 10-09-2019 - 17:15 | |
CVE-2019-0227 | 5.4 |
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to buil
|
21-06-2024 - 19:15 | 01-05-2019 - 21:29 | |
CVE-2019-11358 | 4.3 |
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the n
|
16-02-2024 - 16:32 | 20-04-2019 - 00:29 | |
CVE-2015-7501 | 10.0 |
Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x
|
16-02-2024 - 13:15 | 09-11-2017 - 17:29 | |
CVE-2016-8610 | 5.0 |
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL ser
|
26-01-2024 - 17:44 | 13-11-2017 - 22:29 | |
CVE-2018-8013 | 7.5 |
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before
|
07-01-2024 - 11:15 | 24-05-2018 - 16:29 | |
CVE-2018-8088 | 7.5 |
org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.
|
27-12-2023 - 15:15 | 20-03-2018 - 16:29 | |
CVE-2020-11080 | 5.0 |
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings e
|
16-10-2023 - 18:15 | 03-06-2020 - 23:15 | |
CVE-2018-12207 | 4.9 |
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
|
27-09-2023 - 20:51 | 14-11-2019 - 20:15 | |
CVE-2019-17267 | 7.5 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
|
13-09-2023 - 14:58 | 07-10-2019 - 00:15 | |
CVE-2020-9548 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
|
13-09-2023 - 14:57 | 02-03-2020 - 04:15 | |
CVE-2020-9547 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
|
13-09-2023 - 14:57 | 02-03-2020 - 04:15 | |
CVE-2019-20330 | 7.5 |
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
|
13-09-2023 - 14:55 | 03-01-2020 - 04:15 | |
CVE-2019-16943 | 6.8 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) ja
|
13-09-2023 - 14:55 | 01-10-2019 - 17:15 | |
CVE-2019-16335 | 7.5 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.
|
13-09-2023 - 14:55 | 15-09-2019 - 22:15 | |
CVE-2019-14439 | 5.0 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logbac
|
13-09-2023 - 14:54 | 30-07-2019 - 11:15 | |
CVE-2019-14540 | 7.5 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
|
13-09-2023 - 14:54 | 15-09-2019 - 22:15 | |
CVE-2019-17531 | 6.8 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-ext
|
13-09-2023 - 14:53 | 12-10-2019 - 21:15 | |
CVE-2019-14379 | 7.5 |
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.
|
13-09-2023 - 14:53 | 29-07-2019 - 12:15 | |
CVE-2019-12384 | 4.3 |
FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be
|
13-09-2023 - 14:16 | 24-06-2019 - 16:15 | |
CVE-2019-12086 | 5.0 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java ja
|
13-09-2023 - 14:16 | 17-05-2019 - 17:29 | |
CVE-2019-12814 | 4.3 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in
|
13-09-2023 - 14:15 | 19-06-2019 - 14:15 | |
CVE-2020-11023 | 4.3 |
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may ex
|
31-08-2023 - 03:15 | 29-04-2020 - 21:15 | |
CVE-2020-11022 | 4.3 |
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This prob
|
31-08-2023 - 03:15 | 29-04-2020 - 22:15 | |
CVE-2019-12402 | 5.0 |
The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names insi
|
18-08-2023 - 14:15 | 30-08-2019 - 09:15 | |
CVE-2017-15265 | 6.9 |
Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clie
|
21-06-2023 - 20:59 | 16-10-2017 - 18:29 | |
CVE-2019-16942 | 7.5 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.
|
08-06-2023 - 18:00 | 01-10-2019 - 17:15 | |
CVE-2020-14620 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols
|
18-05-2023 - 18:00 | 15-07-2020 - 18:15 | |
CVE-2020-14619 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protoco
|
18-05-2023 - 18:00 | 15-07-2020 - 18:15 | |
CVE-2020-14614 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pro
|
18-05-2023 - 18:00 | 15-07-2020 - 18:15 | |
CVE-2020-14623 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to c
|
18-05-2023 - 18:00 | 15-07-2020 - 18:15 | |
CVE-2020-14624 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocol
|
18-05-2023 - 18:00 | 15-07-2020 - 18:15 | |
CVE-2020-14631 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Audit). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multip
|
18-05-2023 - 17:56 | 15-07-2020 - 18:15 | |
CVE-2020-14663 | 6.5 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via m
|
18-05-2023 - 17:56 | 15-07-2020 - 18:15 | |
CVE-2020-14654 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pro
|
18-05-2023 - 17:56 | 15-07-2020 - 18:15 | |
CVE-2020-14656 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple proto
|
18-05-2023 - 17:56 | 15-07-2020 - 18:15 | |
CVE-2020-14651 | 5.5 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multip
|
18-05-2023 - 17:56 | 15-07-2020 - 18:15 | |
CVE-2020-14643 | 5.5 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multip
|
18-05-2023 - 17:56 | 15-07-2020 - 18:15 | |
CVE-2020-14597 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pro
|
18-05-2023 - 17:39 | 15-07-2020 - 18:15 | |
CVE-2020-14678 | 6.5 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via m
|
16-05-2023 - 22:59 | 15-07-2020 - 18:15 | |
CVE-2020-14680 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple prot
|
16-05-2023 - 22:58 | 15-07-2020 - 18:15 | |
CVE-2020-14702 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via m
|
16-05-2023 - 22:56 | 15-07-2020 - 18:15 | |
CVE-2020-14575 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols
|
16-05-2023 - 22:55 | 15-07-2020 - 18:15 | |
CVE-2020-14697 | 6.5 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via m
|
16-05-2023 - 22:55 | 15-07-2020 - 18:15 | |
CVE-2020-2978 | 4.0 |
Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having DBA role
|
05-05-2023 - 19:15 | 15-07-2020 - 18:15 | |
CVE-2019-16056 | 5.0 |
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and imple
|
28-02-2023 - 14:30 | 06-09-2019 - 18:15 | |
CVE-2018-10901 | 7.2 |
A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious
|
24-02-2023 - 18:43 | 26-07-2018 - 17:29 | |
CVE-2018-10675 | 7.2 |
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
|
24-02-2023 - 18:43 | 02-05-2018 - 18:29 | |
CVE-2018-10872 | 4.9 |
A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered on
|
12-02-2023 - 23:31 | 10-07-2018 - 19:29 | |
CVE-2016-2183 | 5.0 |
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birth
|
12-02-2023 - 23:17 | 01-09-2016 - 00:59 | |
CVE-2016-0701 | 2.6 |
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent
|
12-02-2023 - 23:15 | 15-02-2016 - 02:59 | |
CVE-2019-17560 | 6.4 |
The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. “Apache N
|
27-01-2023 - 18:31 | 30-03-2020 - 19:15 | |
CVE-2019-16935 | 4.3 |
The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_ti
|
19-01-2023 - 15:46 | 28-09-2019 - 02:15 | |
CVE-2020-13434 | 2.1 |
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
|
09-01-2023 - 16:41 | 24-05-2020 - 22:15 | |
CVE-2019-17571 | 7.5 |
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic fo
|
14-12-2022 - 17:50 | 20-12-2019 - 17:15 | |
CVE-2016-6306 | 4.3 |
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
|
13-12-2022 - 12:15 | 26-09-2016 - 19:59 | |
CVE-2019-1552 | 1.9 |
OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --opens
|
13-12-2022 - 12:15 | 30-07-2019 - 17:15 | |
CVE-2020-14723 | 5.8 |
Vulnerability in the Oracle Help Technologies product of Oracle Fusion Middleware (component: Web UIX). Supported versions that are affected are 11.1.1.9.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network
|
02-12-2022 - 20:37 | 15-07-2020 - 18:15 | |
CVE-2019-2729 | 7.5 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated at
|
10-11-2022 - 04:32 | 19-06-2019 - 23:15 | |
CVE-2020-14556 | 5.8 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenti
|
27-10-2022 - 23:01 | 15-07-2020 - 18:15 | |
CVE-2020-14577 | 4.3 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthen
|
27-10-2022 - 23:00 | 15-07-2020 - 18:15 | |
CVE-2020-14573 | 4.3 |
Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple prot
|
27-10-2022 - 23:00 | 15-07-2020 - 18:15 | |
CVE-2020-14583 | 5.1 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows una
|
27-10-2022 - 22:59 | 15-07-2020 - 18:15 | |
CVE-2020-14578 | 4.3 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated att
|
27-10-2022 - 22:59 | 15-07-2020 - 18:15 | |
CVE-2020-14581 | 4.3 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated a
|
27-10-2022 - 22:59 | 15-07-2020 - 18:15 | |
CVE-2020-14579 | 4.3 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated att
|
27-10-2022 - 22:59 | 15-07-2020 - 18:15 | |
CVE-2020-14621 | 5.0 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenti
|
27-10-2022 - 22:58 | 15-07-2020 - 18:15 | |
CVE-2020-14593 | 4.3 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthentica
|
27-10-2022 - 22:58 | 15-07-2020 - 18:15 | |
CVE-2019-17359 | 5.0 |
The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large attempted memory allocation, and resultant OutOfMemoryError error, via crafted ASN.1 data. This is fixed in 1.64.
|
07-10-2022 - 14:50 | 08-10-2019 - 14:15 | |
CVE-2019-17563 | 5.1 |
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be p
|
07-10-2022 - 13:39 | 23-12-2019 - 17:15 | |
CVE-2020-1951 | 4.3 |
A carefully crafted or corrupt PSD file can cause an infinite loop in Apache Tika's PSDParser in versions 1.0-1.23.
|
07-10-2022 - 01:59 | 23-03-2020 - 14:15 | |
CVE-2020-1950 | 4.3 |
A carefully crafted or corrupt PSD file can cause excessive memory usage in Apache Tika's PSDParser in versions 1.0-1.23.
|
07-10-2022 - 01:59 | 23-03-2020 - 14:15 | |
CVE-2020-1941 | 4.3 |
In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.
|
05-10-2022 - 20:54 | 14-05-2020 - 17:15 | |
CVE-2019-12973 | 4.3 |
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
|
05-10-2022 - 20:37 | 26-06-2019 - 18:15 | |
CVE-2020-14591 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple
|
30-09-2022 - 03:23 | 15-07-2020 - 18:15 | |
CVE-2020-14664 | 5.1 |
Vulnerability in the Java SE product of Oracle Java SE (component: JavaFX). The supported version that is affected is Java SE: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to com
|
28-09-2022 - 20:29 | 15-07-2020 - 18:15 | |
CVE-2020-14562 | 5.0 |
Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protoc
|
27-09-2022 - 20:14 | 15-07-2020 - 18:15 | |
CVE-2019-17569 | 5.8 |
The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of H
|
02-09-2022 - 15:30 | 24-02-2020 - 22:15 | |
CVE-2020-14550 | 3.5 |
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with net
|
29-08-2022 - 20:48 | 15-07-2020 - 18:15 | |
CVE-2016-9840 | 6.8 |
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
|
16-08-2022 - 13:16 | 23-05-2017 - 04:29 | |
CVE-2016-9841 | 7.5 |
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
|
16-08-2022 - 13:02 | 23-05-2017 - 04:29 | |
CVE-2016-9843 | 7.5 |
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
|
16-08-2022 - 13:02 | 23-05-2017 - 04:29 | |
CVE-2020-14725 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pro
|
28-07-2022 - 16:57 | 24-07-2020 - 20:15 | |
CVE-2020-14586 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via m
|
28-07-2022 - 16:56 | 15-07-2020 - 18:15 | |
CVE-2020-14576 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access vi
|
28-07-2022 - 16:54 | 15-07-2020 - 18:15 | |
CVE-2020-5397 | 2.6 |
Spring Framework, versions 5.2.x prior to 5.2.3 are vulnerable to CSRF attacks through CORS preflight requests that target Spring MVC (spring-webmvc module) or Spring WebFlux (spring-webflux module) endpoints. Only non-authenticated endpoints are vul
|
25-07-2022 - 18:15 | 17-01-2020 - 19:15 | |
CVE-2020-5258 | 5.0 |
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker
|
25-07-2022 - 18:15 | 10-03-2020 - 18:15 | |
CVE-2020-5398 | 7.6 |
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response
|
25-07-2022 - 18:15 | 17-01-2020 - 00:15 | |
CVE-2020-7595 | 5.0 |
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
|
25-07-2022 - 18:15 | 21-01-2020 - 23:15 | |
CVE-2020-9484 | 4.4 |
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the Persiste
|
25-07-2022 - 18:15 | 20-05-2020 - 19:15 | |
CVE-2019-20388 | 5.0 |
xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
|
25-07-2022 - 18:15 | 21-01-2020 - 23:15 | |
CVE-2020-1927 | 5.8 |
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
|
25-07-2022 - 18:15 | 02-04-2020 - 00:15 | |
CVE-2019-10086 | 7.5 |
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by defa
|
25-07-2022 - 18:15 | 20-08-2019 - 21:15 | |
CVE-2019-10082 | 6.4 |
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
|
25-07-2022 - 18:15 | 26-09-2019 - 16:15 | |
CVE-2020-10683 | 7.5 |
dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any a
|
25-07-2022 - 18:15 | 01-05-2020 - 19:15 | |
CVE-2016-1000031 | 7.5 |
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
|
25-07-2022 - 18:15 | 25-10-2016 - 14:29 | |
CVE-2019-0220 | 5.0 |
A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions
|
25-07-2022 - 18:15 | 11-06-2019 - 21:29 | |
CVE-2020-14626 | 6.8 |
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web General). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Difficult to explo
|
01-07-2022 - 16:41 | 15-07-2020 - 18:15 | |
CVE-2020-14625 | 7.5 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with n
|
01-07-2022 - 16:40 | 15-07-2020 - 18:15 | |
CVE-2020-14564 | 4.0 |
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Environment Mgmt Console). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows high privileged attacker
|
01-07-2022 - 16:40 | 15-07-2020 - 18:15 | |
CVE-2020-14547 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network ac
|
01-07-2022 - 15:53 | 15-07-2020 - 18:15 | |
CVE-2020-14559 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privilege
|
01-07-2022 - 15:53 | 15-07-2020 - 18:15 | |
CVE-2020-14553 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with networ
|
01-07-2022 - 15:53 | 15-07-2020 - 18:15 | |
CVE-2020-14540 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access v
|
01-07-2022 - 15:51 | 15-07-2020 - 18:15 | |
CVE-2020-14539 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacke
|
01-07-2022 - 15:43 | 15-07-2020 - 18:15 | |
CVE-2020-14568 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to c
|
01-07-2022 - 15:04 | 15-07-2020 - 18:15 | |
CVE-2020-14567 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network
|
01-07-2022 - 15:03 | 15-07-2020 - 18:15 | |
CVE-2020-14633 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to c
|
01-07-2022 - 14:40 | 15-07-2020 - 18:15 | |
CVE-2020-14632 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple proto
|
01-07-2022 - 14:40 | 15-07-2020 - 18:15 | |
CVE-2020-7059 | 6.4 |
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead t
|
01-07-2022 - 12:42 | 10-02-2020 - 08:15 | |
CVE-2020-7060 | 6.4 |
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the alloc
|
01-07-2022 - 12:33 | 10-02-2020 - 08:15 | |
CVE-2018-10237 | 4.3 |
Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray
|
29-06-2022 - 19:15 | 26-04-2018 - 21:29 | |
CVE-2018-1199 | 5.0 |
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a
|
23-06-2022 - 16:42 | 16-03-2018 - 20:29 | |
CVE-2018-1275 | 7.5 |
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A ma
|
23-06-2022 - 16:35 | 11-04-2018 - 13:29 | |
CVE-2018-1272 | 6.0 |
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a r
|
23-06-2022 - 16:33 | 06-04-2018 - 13:29 | |
CVE-2018-1271 | 4.3 |
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file s
|
23-06-2022 - 16:33 | 06-04-2018 - 13:29 | |
CVE-2018-1257 | 4.0 |
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A
|
23-06-2022 - 16:31 | 11-05-2018 - 20:29 | |
CVE-2018-1270 | 7.5 |
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A ma
|
23-06-2022 - 16:31 | 06-04-2018 - 13:29 | |
CVE-2018-11040 | 4.3 |
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controlle
|
23-06-2022 - 16:31 | 25-06-2018 - 15:29 | |
CVE-2018-11039 | 4.3 |
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring
|
23-06-2022 - 16:30 | 25-06-2018 - 15:29 | |
CVE-2019-3739 | 4.3 |
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA key
|
13-06-2022 - 18:38 | 18-09-2019 - 23:15 | |
CVE-2019-3738 | 4.3 |
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to a Missing Required Cryptographic Step vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable share
|
13-06-2022 - 18:38 | 18-09-2019 - 23:15 | |
CVE-2019-14862 | 4.3 |
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
|
07-06-2022 - 18:41 | 02-01-2020 - 15:15 | |
CVE-2019-3740 | 4.3 |
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys
|
07-06-2022 - 18:40 | 18-09-2019 - 23:15 | |
CVE-2018-15756 | 5.0 |
Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler,
|
13-05-2022 - 20:56 | 18-10-2018 - 22:29 | |
CVE-2020-13631 | 2.1 |
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
|
13-05-2022 - 20:56 | 27-05-2020 - 15:15 | |
CVE-2020-13632 | 2.1 |
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
|
13-05-2022 - 20:56 | 27-05-2020 - 15:15 | |
CVE-2020-13630 | 4.4 |
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
|
13-05-2022 - 20:56 | 27-05-2020 - 15:15 | |
CVE-2020-8172 | 5.8 |
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
|
12-05-2022 - 15:01 | 08-06-2020 - 14:15 | |
CVE-2020-9488 | 4.3 |
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Lo
|
12-05-2022 - 15:00 | 27-04-2020 - 16:15 | |
CVE-2020-6851 | 5.0 |
OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
|
29-04-2022 - 13:24 | 13-01-2020 - 06:15 | |
CVE-2020-14641 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multip
|
28-04-2022 - 18:57 | 15-07-2020 - 18:15 | |
CVE-2020-14634 | 4.0 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to c
|
28-04-2022 - 18:57 | 15-07-2020 - 18:15 | |
CVE-2019-17561 | 5.0 |
The "Apache NetBeans" autoupdate system does not fully validate code signatures. An attacker could modify the downloaded nbm and include additional code. "Apache NetBeans" versions up to and including 11.2 are affected by this vulnerability.
|
27-04-2022 - 15:14 | 30-03-2020 - 19:15 | |
CVE-2020-1934 | 5.0 |
In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
|
26-04-2022 - 17:05 | 01-04-2020 - 20:15 | |
CVE-2019-10247 | 5.0 |
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 4
|
22-04-2022 - 20:09 | 22-04-2019 - 20:29 | |
CVE-2019-5427 | 5.0 |
c3p0 version < 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.
|
22-04-2022 - 19:28 | 22-04-2019 - 21:29 | |
CVE-2016-8332 | 6.8 |
A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted
|
19-04-2022 - 20:15 | 28-10-2016 - 14:59 | |
CVE-2019-1551 | 5.0 |
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this d
|
19-04-2022 - 15:36 | 06-12-2019 - 18:15 | |
CVE-2019-0201 | 4.3 |
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field a
|
19-04-2022 - 15:35 | 23-05-2019 - 14:29 | |
CVE-2018-3693 | 4.7 |
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
|
18-04-2022 - 18:15 | 10-07-2018 - 21:29 | |
CVE-2018-11054 | 5.0 |
RSA BSAFE Micro Edition Suite, version 4.1.6, contains an integer overflow vulnerability. A remote attacker could use maliciously constructed ASN.1 data to potentially cause a Denial Of Service.
|
18-04-2022 - 18:15 | 31-08-2018 - 18:29 | |
CVE-2018-11056 | 4.0 |
RSA BSAFE Micro Edition Suite, prior to 4.1.6.1 (in 4.1.x), and RSA BSAFE Crypto-C Micro Edition versions prior to 4.0.5.3 (in 4.0.x) contain an Uncontrolled Resource Consumption ('Resource Exhaustion') vulnerability when parsing ASN.1 data. A remote
|
18-04-2022 - 18:15 | 31-08-2018 - 18:29 | |
CVE-2018-11057 | 4.3 |
RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6.1 (in 4.1.x) contains a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be
|
18-04-2022 - 18:15 | 31-08-2018 - 18:29 | |
CVE-2018-11055 | 2.1 |
RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6.1 (in 4.1.x), contains an Improper Clearing of Heap Memory Before Release ('Heap Inspection') vulnerability. Decoded PKCS #12 data in heap memory is not zeroized by
|
18-04-2022 - 18:15 | 31-08-2018 - 18:29 | |
CVE-2018-15769 | 5.0 |
RSA BSAFE Micro Edition Suite versions prior to 4.0.11 (in 4.0.x series) and versions prior to 4.1.6.2 (in 4.1.x series) contain a key management error issue. A malicious TLS server could potentially cause a Denial Of Service (DoS) on TLS clients dur
|
18-04-2022 - 18:12 | 16-11-2018 - 21:29 | |
CVE-2018-11058 | 7.5 |
RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6 (in 4.1.x), and RSA BSAFE Crypto-C Micro Edition, version prior to 4.0.5.3 (in 4.0.x) contain a Buffer Over-Read vulnerability when parsing ASN.1 data. A remote att
|
18-04-2022 - 18:12 | 14-09-2018 - 20:29 | |
CVE-2018-1288 | 5.5 |
In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data
|
18-04-2022 - 17:31 | 26-07-2018 - 14:29 | |
CVE-2018-1258 | 6.5 |
Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted
|
11-04-2022 - 17:18 | 11-05-2018 - 20:29 | |
CVE-2019-12415 | 2.1 |
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML E
|
08-04-2022 - 13:30 | 23-10-2019 - 20:15 | |
CVE-2020-11656 | 7.5 |
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
|
08-04-2022 - 10:34 | 09-04-2020 - 03:15 | |
CVE-2020-11655 | 5.0 |
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
|
08-04-2022 - 10:34 | 09-04-2020 - 03:15 | |
CVE-2020-9327 | 5.0 |
In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
|
08-04-2022 - 10:33 | 21-02-2020 - 22:15 | |
CVE-2019-17091 | 4.3 |
faces/context/PartialViewContextImpl.java in Eclipse Mojarra, as used in Mojarra for Eclipse EE4J before 2.3.10 and Mojarra JavaServer Faces before 2.2.20, allows Reflected XSS because a client window field is mishandled.
|
06-04-2022 - 18:00 | 02-10-2019 - 14:15 | |
CVE-2017-5645 | 7.5 |
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
|
04-04-2022 - 16:53 | 17-04-2017 - 21:59 | |
CVE-2020-1945 | 3.3 |
Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files fr
|
04-04-2022 - 13:31 | 14-05-2020 - 16:15 | |
CVE-2017-15708 | 7.5 |
In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed
|
08-03-2022 - 15:39 | 11-12-2017 - 15:29 | |
CVE-2020-1967 | 5.0 |
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occur
|
10-12-2021 - 17:11 | 21-04-2020 - 14:15 | |
CVE-2020-9546 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
|
02-12-2021 - 21:22 | 02-03-2020 - 04:15 | |
CVE-2016-5017 | 6.8 |
Buffer overflow in the C cli shell in Apache Zookeeper before 3.4.9 and 3.5.x before 3.5.3, when using the "cmd:" batch mode syntax, allows attackers to have unspecified impact via a long command string.
|
17-11-2021 - 22:15 | 21-09-2016 - 14:25 | |
CVE-2019-10192 | 6.5 |
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis
|
28-10-2021 - 12:14 | 11-07-2019 - 19:15 | |
CVE-2019-10193 | 6.5 |
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perfo
|
28-10-2021 - 12:14 | 11-07-2019 - 19:15 | |
CVE-2018-8012 | 5.0 |
No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit cha
|
14-09-2021 - 12:13 | 21-05-2018 - 19:29 | |
CVE-2019-10092 | 4.3 |
In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only
|
09-09-2021 - 01:05 | 26-09-2019 - 16:15 | |
CVE-2020-14711 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
08-09-2021 - 17:22 | 15-07-2020 - 18:15 | |
CVE-2018-1000632 | 5.0 |
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be explo
|
07-09-2021 - 06:15 | 20-08-2018 - 19:31 | |
CVE-2018-3639 | 2.1 |
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access vi
|
13-08-2021 - 15:26 | 22-05-2018 - 12:29 | |
CVE-2019-8457 | 7.5 |
SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.
|
31-07-2021 - 08:15 | 30-05-2019 - 16:29 | |
CVE-2019-1563 | 4.3 |
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decryp
|
31-07-2021 - 08:15 | 10-09-2019 - 17:15 | |
CVE-2019-19956 | 5.0 |
xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
|
21-07-2021 - 11:39 | 24-12-2019 - 16:15 | |
CVE-2020-14635 | 5.0 |
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Logging). Supported versions that are affected are 12.2.5-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network acce
|
21-07-2021 - 11:39 | 15-07-2020 - 18:15 | |
CVE-2020-14636 | 5.8 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample apps). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthentica
|
21-07-2021 - 11:39 | 15-07-2020 - 18:15 | |
CVE-2020-14542 | 2.1 |
Vulnerability in the Oracle Solaris product of Oracle Systems (component: libsuri). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris ex
|
21-07-2021 - 11:39 | 15-07-2020 - 18:15 | |
CVE-2020-14571 | 6.4 |
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Mobile Service). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker
|
21-07-2021 - 11:39 | 15-07-2020 - 18:15 | |
CVE-2020-14548 | 2.1 |
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web General). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Difficult to exploit vulnerability allows
|
21-07-2021 - 11:39 | 15-07-2020 - 18:15 | |
CVE-2020-14639 | 5.0 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample apps). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthentica
|
21-07-2021 - 11:39 | 15-07-2020 - 18:15 | |
CVE-2020-14544 | 4.0 |
Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Data, Domain & Function Security). The supported version that is affected is 6.4.3. Easily exploitable vulnerability allows low privileged attacker with
|
21-07-2021 - 11:39 | 15-07-2020 - 18:15 | |
CVE-2019-0222 | 5.0 |
In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.
|
21-07-2021 - 11:39 | 28-03-2019 - 22:29 | |
CVE-2017-5637 | 5.0 |
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3
|
20-07-2021 - 23:15 | 10-10-2017 - 01:30 | |
CVE-2019-10097 | 6.0 |
In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulner
|
07-07-2021 - 19:01 | 26-09-2019 - 16:15 | |
CVE-2018-17196 | 6.5 |
In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses transaction/idempotent ACL validation. Only authenticated clients with Write permission on the respective topics are able to exploi
|
03-07-2021 - 21:15 | 11-07-2019 - 21:15 | |
CVE-2019-17573 | 4.3 |
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into
|
17-06-2021 - 17:24 | 16-01-2020 - 18:15 | |
CVE-2019-12423 | 4.3 |
Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from
|
17-06-2021 - 17:24 | 16-01-2020 - 18:15 | |
CVE-2020-13435 | 2.1 |
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
|
14-06-2021 - 18:15 | 24-05-2020 - 22:15 | |
CVE-2017-12626 | 5.0 |
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and
|
14-06-2021 - 18:15 | 29-01-2018 - 17:29 | |
CVE-2019-10246 | 5.0 |
In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory co
|
14-06-2021 - 18:15 | 22-04-2019 - 20:29 | |
CVE-2018-3665 | 4.7 |
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
|
09-06-2021 - 16:24 | 21-06-2018 - 20:29 | |
CVE-2019-10081 | 5.0 |
HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header value
|
06-06-2021 - 11:15 | 15-08-2019 - 22:15 | |
CVE-2019-2904 | 7.5 |
Vulnerability in the Oracle JDeveloper and ADF product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacke
|
18-05-2021 - 12:58 | 16-10-2019 - 18:15 | |
CVE-2020-1935 | 5.8 |
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smug
|
04-05-2021 - 19:19 | 24-02-2020 - 22:15 | |
CVE-2020-8112 | 6.8 |
opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different issue than CVE-2020-6851.
|
02-04-2021 - 12:15 | 28-01-2020 - 18:15 | |
CVE-2019-14893 | 7.5 |
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling m
|
16-03-2021 - 17:29 | 02-03-2020 - 21:15 | |
CVE-2019-0188 | 5.0 |
Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed.
|
15-03-2021 - 18:25 | 28-05-2019 - 19:29 | |
CVE-2020-11620 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
|
22-02-2021 - 21:33 | 07-04-2020 - 23:15 | |
CVE-2020-11619 | 6.8 |
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
|
22-02-2021 - 21:29 | 07-04-2020 - 23:15 | |
CVE-2020-14628 | 4.6 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
22-02-2021 - 14:42 | 15-07-2020 - 18:15 | |
CVE-2020-14674 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
22-02-2021 - 12:29 | 15-07-2020 - 18:15 | |
CVE-2020-14629 | 4.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
19-02-2021 - 18:51 | 15-07-2020 - 18:15 | |
CVE-2020-14675 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
19-02-2021 - 18:50 | 15-07-2020 - 18:15 | |
CVE-2020-14676 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
19-02-2021 - 18:37 | 15-07-2020 - 18:15 | |
CVE-2020-14677 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
19-02-2021 - 16:22 | 15-07-2020 - 18:15 | |
CVE-2020-14649 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
17-02-2021 - 00:16 | 15-07-2020 - 18:15 | |
CVE-2020-14648 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
17-02-2021 - 00:10 | 15-07-2020 - 18:15 | |
CVE-2020-14647 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
17-02-2021 - 00:08 | 15-07-2020 - 18:15 | |
CVE-2020-14646 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
17-02-2021 - 00:04 | 15-07-2020 - 18:15 | |
CVE-2020-14715 | 2.1 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
17-02-2021 - 00:01 | 15-07-2020 - 18:15 | |
CVE-2020-14714 | 2.1 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
17-02-2021 - 00:00 | 15-07-2020 - 18:15 | |
CVE-2020-14713 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
16-02-2021 - 23:58 | 15-07-2020 - 18:15 | |
CVE-2020-14712 | 1.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attack
|
16-02-2021 - 23:57 | 15-07-2020 - 18:15 | |
CVE-2020-14707 | 1.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attack
|
16-02-2021 - 23:56 | 15-07-2020 - 18:15 | |
CVE-2020-14704 | 4.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
16-02-2021 - 23:55 | 15-07-2020 - 18:15 | |
CVE-2020-14703 | 4.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
16-02-2021 - 23:55 | 15-07-2020 - 18:15 | |
CVE-2020-14700 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
16-02-2021 - 23:54 | 15-07-2020 - 18:15 | |
CVE-2020-14699 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
16-02-2021 - 23:53 | 15-07-2020 - 18:15 | |
CVE-2020-14698 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
16-02-2021 - 23:52 | 15-07-2020 - 18:15 | |
CVE-2020-14695 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
16-02-2021 - 23:52 | 15-07-2020 - 18:15 | |
CVE-2020-14694 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
16-02-2021 - 23:51 | 15-07-2020 - 18:15 | |
CVE-2020-14650 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
16-02-2021 - 23:50 | 15-07-2020 - 18:15 | |
CVE-2020-14673 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
16-02-2021 - 23:49 | 15-07-2020 - 18:15 | |
CVE-2018-6616 | 4.3 |
In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
|
03-02-2021 - 16:12 | 04-02-2018 - 22:29 | |
CVE-2015-9251 | 4.3 |
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
|
08-01-2021 - 12:15 | 18-01-2018 - 23:29 | |
CVE-2019-1549 | 5.0 |
OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this pro
|
20-10-2020 - 22:15 | 10-09-2019 - 17:15 | |
CVE-2018-12023 | 5.1 |
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provid
|
20-10-2020 - 22:15 | 21-03-2019 - 16:00 | |
CVE-2019-12086 | 5.0 |
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java ja
|
01-10-2020 - 00:15 | 17-05-2019 - 17:29 | |
CVE-2020-11023 | 4.3 |
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may ex
|
01-10-2020 - 00:15 | 29-04-2020 - 21:15 | |
CVE-2020-1945 | 3.3 |
Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files fr
|
30-09-2020 - 21:15 | 14-05-2020 - 16:15 | |
CVE-2020-11022 | 4.3 |
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This prob
|
25-09-2020 - 20:15 | 29-04-2020 - 22:15 | |
CVE-2020-14650 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14698 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14713 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14703 | 4.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14699 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14649 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14676 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14674 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14677 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14646 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14648 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14715 | 2.1 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14714 | 2.1 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14629 | 4.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14628 | 4.6 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14704 | 4.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14647 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14695 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14694 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14712 | 1.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attack
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14675 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14673 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14711 | 4.4 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attac
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14700 | 4.7 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Difficult to exploit vulnerability allows high privileged att
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2020-14707 | 1.9 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attack
|
24-09-2020 - 06:15 | 15-07-2020 - 18:15 | |
CVE-2018-5390 | 7.8 |
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
|
18-09-2020 - 16:14 | 06-08-2018 - 20:29 | |
CVE-2020-14608 | 6.4 |
Vulnerability in the Oracle Fusion Middleware MapViewer product of Oracle Fusion Middleware (component: Tile Server). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network
|
17-09-2020 - 16:37 | 15-07-2020 - 18:15 | |
CVE-2016-2381 | 5.0 |
Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
|
10-09-2020 - 13:20 | 08-04-2016 - 15:59 | |
CVE-2016-4797 | 4.3 |
Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for
|
09-09-2020 - 19:57 | 03-02-2017 - 16:59 | |
CVE-2016-9112 | 5.0 |
Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2.
|
09-09-2020 - 19:57 | 29-10-2016 - 10:59 | |
CVE-2016-4796 | 4.3 |
Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file.
|
09-09-2020 - 19:57 | 03-02-2017 - 16:59 | |
CVE-2016-1924 | 4.3 |
The opj_tgt_reset function in OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image. Per <a href="https://github.com/uclouvain/openjpeg/issues/704">LINK</a> th
|
09-09-2020 - 19:57 | 27-01-2016 - 20:59 | |
CVE-2016-3183 | 4.3 |
The sycc422_t_rgb function in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted jpeg2000 file.
|
09-09-2020 - 19:57 | 03-02-2017 - 16:59 | |
CVE-2016-1923 | 4.3 |
Heap-based buffer overflow in the opj_j2k_update_image_data function in OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
|
09-09-2020 - 19:57 | 27-01-2016 - 20:59 | |
CVE-2018-6913 | 7.5 |
Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
|
24-08-2020 - 17:37 | 17-04-2018 - 20:29 | |
CVE-2019-5489 | 2.1 |
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this af
|
24-08-2020 - 17:37 | 07-01-2019 - 17:29 | |
CVE-2018-6797 | 7.5 |
An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.
|
24-08-2020 - 17:37 | 17-04-2018 - 20:29 | |
CVE-2018-7566 | 4.6 |
The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
|
24-08-2020 - 17:37 | 30-03-2018 - 21:29 | |
CVE-2018-3646 | 4.7 |
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fau
|
24-08-2020 - 17:37 | 14-08-2018 - 19:29 | |
CVE-2018-3620 | 4.7 |
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel an
|
24-08-2020 - 17:37 | 14-08-2018 - 19:29 | |
CVE-2018-18311 | 7.5 |
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
|
24-08-2020 - 17:37 | 07-12-2018 - 21:29 | |
CVE-2018-17190 | 7.5 |
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the mast
|
24-08-2020 - 17:37 | 19-11-2018 - 14:29 | |
CVE-2018-12015 | 6.4 |
In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
|
24-08-2020 - 17:37 | 07-06-2018 - 13:29 | |
CVE-2020-2966 | 5.8 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated
|
21-07-2020 - 14:22 | 15-07-2020 - 18:15 | |
CVE-2020-2967 | 5.0 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows
|
21-07-2020 - 14:09 | 15-07-2020 - 18:15 | |
CVE-2020-2968 | 4.6 |
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Proc
|
21-07-2020 - 13:53 | 15-07-2020 - 18:15 | |
CVE-2020-2562 | 4.3 |
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Investor Module). Supported versions that are affected are 16.1.0.0-16.1.5.1, 18.0.0.0-18.0.2.0 and 19.0.0.0. Easily exploitable vulnerabil
|
21-07-2020 - 13:49 | 15-07-2020 - 18:15 | |
CVE-2020-2969 | 6.0 |
Vulnerability in the Data Pump component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows high privileged attacker having DBA role account privile
|
21-07-2020 - 13:47 | 15-07-2020 - 18:15 | |
CVE-2020-2513 | 3.5 |
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access
|
21-07-2020 - 13:45 | 15-07-2020 - 18:15 | |
CVE-2020-2974 | 3.5 |
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access
|
21-07-2020 - 13:19 | 15-07-2020 - 18:15 | |
CVE-2020-2975 | 3.5 |
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access
|
21-07-2020 - 13:18 | 15-07-2020 - 18:15 | |
CVE-2020-2976 | 3.5 |
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access
|
21-07-2020 - 13:18 | 15-07-2020 - 18:15 | |
CVE-2020-14592 | 4.3 |
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Rich Text Editor). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with net
|
21-07-2020 - 13:13 | 15-07-2020 - 18:15 | |
CVE-2020-14588 | 6.4 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allow
|
21-07-2020 - 03:07 | 15-07-2020 - 18:15 | |
CVE-2020-14563 | 4.3 |
Vulnerability in the Oracle Enterprise Communications Broker product of Oracle Communications Applications (component: WebGUI). Supported versions that are affected are 3.0.0-3.2.0. Easily exploitable vulnerability allows unauthenticated attacker wit
|
21-07-2020 - 03:07 | 15-07-2020 - 18:15 | |
CVE-2020-14590 | 4.0 |
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Page Request). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows high privileged attacker with
|
21-07-2020 - 03:07 | 15-07-2020 - 18:15 | |
CVE-2020-14561 | 4.4 |
Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Installation). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attack
|
21-07-2020 - 03:07 | 15-07-2020 - 18:15 | |
CVE-2020-14536 | 5.8 |
Vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager product of Oracle Commerce (component: Workbench). Supported versions that are affected are 11.0, 11.1, 11.2 and prior to 11.3.1. Difficult to exploit vulnerabili
|
21-07-2020 - 03:06 | 15-07-2020 - 18:15 | |
CVE-2020-14560 | 2.1 |
Vulnerability in the Oracle Hyperion BI+ product of Oracle Hyperion (component: UI and Visualization). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP
|
21-07-2020 - 03:06 | 15-07-2020 - 18:15 | |
CVE-2020-14558 | 5.0 |
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network acces
|
21-07-2020 - 03:06 | 15-07-2020 - 18:15 | |
CVE-2020-14557 | 4.0 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Difficult to exploit vulnerability allows unauthen
|
21-07-2020 - 03:04 | 15-07-2020 - 18:15 | |
CVE-2020-14555 | 4.3 |
Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker
|
21-07-2020 - 03:04 | 15-07-2020 - 18:15 | |
CVE-2020-14554 | 4.3 |
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.8. Easily exploitable vulnerability allows unauthenticated attacker wi
|
21-07-2020 - 03:04 | 15-07-2020 - 18:15 | |
CVE-2020-14552 | 3.5 |
Vulnerability in the Oracle WebCenter Portal product of Oracle Fusion Middleware (component: Security Framework). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged a
|
21-07-2020 - 03:02 | 15-07-2020 - 18:15 | |
CVE-2020-14551 | 4.0 |
Vulnerability in the Oracle AutoVue product of Oracle Supply Chain (component: Security). The supported version that is affected is 21.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracl
|
21-07-2020 - 03:01 | 15-07-2020 - 18:15 | |
CVE-2020-14566 | 4.3 |
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 16.1.0.0-16.1.5.1, 18.0.0.0-18.0.2.0 and 19.0.0.0. Easily exploitable vulnerability a
|
21-07-2020 - 02:57 | 15-07-2020 - 18:15 | |
CVE-2020-14565 | 4.9 |
Vulnerability in the Oracle Unified Directory product of Oracle Fusion Middleware (component: Security). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows high privileged attacker
|
21-07-2020 - 02:48 | 15-07-2020 - 18:15 | |
CVE-2020-14721 | 6.5 |
Vulnerability in the Oracle Enterprise Communications Broker product of Oracle Communications Applications (component: WebGUI). Supported versions that are affected are 3.0.0-3.2.0. Easily exploitable vulnerability allows low privileged attacker with
|
21-07-2020 - 00:54 | 15-07-2020 - 18:15 | |
CVE-2020-14722 | 5.1 |
Vulnerability in the Oracle Enterprise Communications Broker product of Oracle Communications Applications (component: WebGUI). Supported versions that are affected are 3.0.0-3.2.0. Difficult to exploit vulnerability allows unauthenticated attacker w
|
21-07-2020 - 00:53 | 15-07-2020 - 18:15 | |
CVE-2020-14724 | 4.4 |
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Device Driver Utility). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Ora
|
21-07-2020 - 00:18 | 15-07-2020 - 18:15 | |
CVE-2020-2977 | 4.9 |
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network a
|
20-07-2020 - 20:29 | 15-07-2020 - 18:15 | |
CVE-2020-2973 | 3.5 |
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access
|
20-07-2020 - 20:25 | 15-07-2020 - 18:15 | |
CVE-2020-2972 | 3.5 |
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access
|
20-07-2020 - 20:21 | 15-07-2020 - 18:15 | |
CVE-2020-14528 | 5.8 |
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 16.1.0.0-16.1.5.1, 18.0.0.0-18.0.2.0 and 19.0.0.0. Easily exploitable vulnerability a
|
20-07-2020 - 20:16 | 15-07-2020 - 18:15 | |
CVE-2020-14527 | 4.0 |
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 16.1.0.0-16.1.5.1, 18.0.0.0-18.0.2.0 and 19.0.0.0. Difficult to exploit vulnerability
|
20-07-2020 - 20:16 | 15-07-2020 - 18:15 | |
CVE-2020-14529 | 4.9 |
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Investor Module). Supported versions that are affected are 16.1.0.0-16.1.5.1, 18.0.0.0-18.0.2.0 and 19.0.0.0. Easily exploitable vulnerabil
|
20-07-2020 - 20:14 | 15-07-2020 - 18:15 | |
CVE-2020-14530 | 4.3 |
Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: None). The supported version that is affected is 11.1.1.9.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS
|
20-07-2020 - 20:06 | 15-07-2020 - 18:15 | |
CVE-2020-14531 | 4.0 |
Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: SWSE Server). Supported versions that are affected are 20.6 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP t
|
20-07-2020 - 20:02 | 15-07-2020 - 18:15 | |
CVE-2020-14532 | 4.3 |
Vulnerability in the Oracle Commerce Platform product of Oracle Commerce (component: Dynamo Application Framework). Supported versions that are affected are 11.1, 11.2 and prior to 11.3.1. Easily exploitable vulnerability allows unauthenticated attac
|
20-07-2020 - 19:55 | 15-07-2020 - 18:15 | |
CVE-2020-14533 | 4.9 |
Vulnerability in the Oracle Commerce Platform product of Oracle Commerce (component: Dynamo Application Framework). Supported versions that are affected are 11.1, 11.2 and prior to 11.3.1. Easily exploitable vulnerability allows high privileged attac
|
20-07-2020 - 19:49 | 15-07-2020 - 18:15 | |
CVE-2020-14534 | 5.8 |
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Popups). The supported version that is affected is 12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP
|
20-07-2020 - 19:45 | 15-07-2020 - 18:15 | |
CVE-2020-14708 | 4.0 |
Vulnerability in the Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Segment). Supported versions that are affected are 16.0, 17.0 and 18.0. Easily exploitable vulnerability allows low privileged atta
|
20-07-2020 - 19:00 | 15-07-2020 - 18:15 | |
CVE-2020-14710 | 5.5 |
Vulnerability in the Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Security). Supported versions that are affected are 16.0, 17.0 and 18.0. Easily exploitable vulnerability allows low privileged att
|
20-07-2020 - 18:59 | 15-07-2020 - 18:15 | |
CVE-2020-14709 | 5.5 |
Vulnerability in the Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Card). Supported versions that are affected are 16.0, 17.0 and 18.0. Easily exploitable vulnerability allows low privileged attacke
|
20-07-2020 - 18:59 | 15-07-2020 - 18:15 | |
CVE-2020-2982 | 5.5 |
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Enterprise Config Management). Supported versions that are affected are 13.3.0.0 and 13.4.0.0. Easily exploitable vulnerability allows low privileg
|
20-07-2020 - 18:58 | 15-07-2020 - 18:15 | |
CVE-2020-2981 | 3.7 |
Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 18.1.40. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes
|
20-07-2020 - 18:54 | 15-07-2020 - 18:15 | |
CVE-2020-2983 | 5.5 |
Vulnerability in the Oracle Data Masking and Subsetting product of Oracle Enterprise Manager (component: Data Masking). Supported versions that are affected are 13.3.0.0 and 13.4.0.0. Easily exploitable vulnerability allows low privileged attacker wi
|
20-07-2020 - 18:54 | 15-07-2020 - 18:15 | |
CVE-2020-14589 | 5.0 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allow
|
20-07-2020 - 18:35 | 15-07-2020 - 18:15 | |
CVE-2020-14716 | 4.3 |
Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated
|
20-07-2020 - 18:30 | 15-07-2020 - 18:15 | |
CVE-2020-14717 | 4.3 |
Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated
|
20-07-2020 - 18:29 | 15-07-2020 - 18:15 | |
CVE-2020-14718 | 6.5 |
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: JVMCI). Supported versions that are affected are 19.3.2 and 20.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via
|
20-07-2020 - 18:26 | 15-07-2020 - 18:15 | |
CVE-2020-14719 | 4.0 |
Vulnerability in the Oracle Internet Expenses product of Oracle E-Business Suite (component: Mobile Expenses Admin Utilities). Supported versions that are affected are 12.2.4-12.2.9. Easily exploitable vulnerability allows low privileged attacker wit
|
20-07-2020 - 18:19 | 15-07-2020 - 18:15 | |
CVE-2020-14535 | 5.8 |
Vulnerability in the Oracle Commerce Service Center product of Oracle Commerce (component: Commerce Service Center). Supported versions that are affected are 11.1, 11.2 and prior to 11.3.1. Difficult to exploit vulnerability allows unauthenticated at
|
20-07-2020 - 18:16 | 15-07-2020 - 18:15 | |
CVE-2020-14706 | 4.0 |
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 17.1.0.0-17.12.17.1, 18.1.0.0-18.8.19 and 19.12.0-19.12.5. Diff
|
20-07-2020 - 18:00 | 15-07-2020 - 18:15 | |
CVE-2020-14705 | 5.8 |
Vulnerability in the Oracle GoldenGate product of Oracle GoldenGate (component: Process Management). The supported version that is affected is Prior to 19.1.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with access to the ph
|
20-07-2020 - 17:56 | 15-07-2020 - 18:15 | |
CVE-2020-14693 | 4.0 |
Vulnerability in the Oracle Insurance Accounting Analyzer product of Oracle Financial Services Applications (component: User Interface). Supported versions that are affected are 8.0.6-8.0.9. Easily exploitable vulnerability allows low privileged atta
|
20-07-2020 - 17:55 | 15-07-2020 - 18:15 | |
CVE-2020-14692 | 4.0 |
Vulnerability in the Oracle Financial Services Loan Loss Forecasting and Provisioning product of Oracle Financial Services Applications (component: User Interface). Supported versions that are affected are 8.0.6-8.0.8. Easily exploitable vulnerabilit
|
20-07-2020 - 17:54 | 15-07-2020 - 18:15 | |
CVE-2020-14690 | 5.8 |
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vul
|
20-07-2020 - 17:53 | 15-07-2020 - 18:15 | |
CVE-2020-14691 | 5.5 |
Vulnerability in the Oracle Financial Services Liquidity Risk Management product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.0.6. Easily exploitable vulnerability allows low privi
|
20-07-2020 - 17:53 | 15-07-2020 - 18:15 | |
CVE-2020-14687 | 7.5 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with n
|
20-07-2020 - 17:52 | 15-07-2020 - 18:15 | |
CVE-2020-14720 | 4.0 |
Vulnerability in the Oracle Internet Expenses product of Oracle E-Business Suite (component: Mobile Expenses Admin Utilities). Supported versions that are affected are 12.2.4-12.2.9. Easily exploitable vulnerability allows low privileged attacker wit
|
20-07-2020 - 17:52 | 15-07-2020 - 18:15 | |
CVE-2020-2984 | 5.5 |
Vulnerability in the Oracle Configuration Manager product of Oracle Enterprise Manager (component: Discovery and collection script). The supported version that is affected is 12.1.2.0.6. Easily exploitable vulnerability allows low privileged attacker
|
20-07-2020 - 17:52 | 15-07-2020 - 18:15 | |
CVE-2020-14688 | 5.8 |
Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated
|
20-07-2020 - 17:52 | 15-07-2020 - 18:15 | |
CVE-2020-14617 | 3.5 |
Vulnerability in the Primavera Unifier product of Oracle Construction and Engineering (component: Platform, Mobile App). Supported versions that are affected are 16.1, 16.2, 17.7-17.12, 18.8 and 19.12; Mobile App: Prior to 20.6. Easily exploitable vu
|
20-07-2020 - 17:49 | 15-07-2020 - 18:15 | |
CVE-2020-14618 | 4.0 |
Vulnerability in the Primavera Unifier product of Oracle Construction and Engineering (component: Mobile App). The supported version that is affected is Prior to 20.6. Difficult to exploit vulnerability allows unauthenticated attacker with network ac
|
20-07-2020 - 17:47 | 15-07-2020 - 18:15 | |
CVE-2020-14652 | 6.4 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthe
|
20-07-2020 - 17:39 | 15-07-2020 - 18:15 | |
CVE-2020-14627 | 5.8 |
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access
|
20-07-2020 - 17:36 | 15-07-2020 - 18:15 | |
CVE-2020-14602 | 5.5 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
20-07-2020 - 17:31 | 15-07-2020 - 18:15 | |
CVE-2020-14655 | 5.8 |
Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: SSL API). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker
|
20-07-2020 - 17:30 | 15-07-2020 - 18:15 | |
CVE-2020-14653 | 5.5 |
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 16.1.0.0-16.2.20.1, 17.1.0.0-17.12.17.1 and 18.1.0.0-18.8.18.2.
|
20-07-2020 - 17:27 | 15-07-2020 - 18:15 | |
CVE-2020-14685 | 4.0 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
20-07-2020 - 17:15 | 15-07-2020 - 18:15 | |
CVE-2020-14684 | 4.3 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
20-07-2020 - 17:14 | 15-07-2020 - 18:15 | |
CVE-2020-14594 | 4.4 |
Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Inventory Integration). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows high privile
|
20-07-2020 - 17:06 | 15-07-2020 - 18:15 | |
CVE-2020-14645 | 7.5 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthe
|
20-07-2020 - 17:05 | 15-07-2020 - 18:15 | |
CVE-2020-14595 | 6.4 |
Vulnerability in the Oracle iLearning product of Oracle iLearning (component: Assessment Manager). Supported versions that are affected are 6.1 and 6.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP t
|
20-07-2020 - 17:01 | 15-07-2020 - 18:15 | |
CVE-2020-14682 | 5.8 |
Vulnerability in the Oracle Depot Repair product of Oracle E-Business Suite (component: Estimate and Actual Charges). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with networ
|
20-07-2020 - 16:58 | 15-07-2020 - 18:15 | |
CVE-2020-14600 | 4.3 |
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network acces
|
20-07-2020 - 16:56 | 15-07-2020 - 18:15 | |
CVE-2020-14658 | 6.4 |
Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker
|
20-07-2020 - 16:54 | 15-07-2020 - 18:15 | |
CVE-2020-14657 | 4.9 |
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with
|
20-07-2020 - 16:47 | 15-07-2020 - 18:15 | |
CVE-2020-14701 | 7.5 |
Vulnerability in the Oracle SD-WAN Aware product of Oracle Communications Applications (component: User Interface). The supported version that is affected is 8.2. Easily exploitable vulnerability allows unauthenticated attacker with network access vi
|
20-07-2020 - 16:45 | 15-07-2020 - 18:15 | |
CVE-2020-14686 | 5.8 |
Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Others). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network acces
|
20-07-2020 - 16:44 | 15-07-2020 - 18:15 | |
CVE-2020-14638 | 5.8 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample apps). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthentica
|
20-07-2020 - 16:19 | 15-07-2020 - 18:15 | |
CVE-2020-14665 | 6.4 |
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: Invoice). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with netw
|
20-07-2020 - 16:17 | 15-07-2020 - 18:15 | |
CVE-2020-14637 | 5.8 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample apps). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthentica
|
20-07-2020 - 16:16 | 15-07-2020 - 18:15 | |
CVE-2020-14662 | 6.5 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
20-07-2020 - 16:05 | 15-07-2020 - 18:15 | |
CVE-2020-14601 | 4.3 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
20-07-2020 - 16:04 | 15-07-2020 - 18:15 | |
CVE-2020-14661 | 4.3 |
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with
|
20-07-2020 - 16:02 | 15-07-2020 - 18:15 | |
CVE-2020-14660 | 5.8 |
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with
|
20-07-2020 - 16:01 | 15-07-2020 - 18:15 | |
CVE-2020-14659 | 4.3 |
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with
|
20-07-2020 - 16:00 | 15-07-2020 - 18:15 | |
CVE-2020-14681 | 5.8 |
Vulnerability in the Oracle E-Business Intelligence product of Oracle E-Business Suite (component: DBI Setups). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network acce
|
20-07-2020 - 15:55 | 15-07-2020 - 18:15 | |
CVE-2020-14679 | 5.0 |
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with
|
20-07-2020 - 15:45 | 15-07-2020 - 18:15 | |
CVE-2020-14696 | 6.4 |
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Layout Templates). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attack
|
20-07-2020 - 15:37 | 15-07-2020 - 18:15 | |
CVE-2020-14596 | 4.3 |
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Address Book). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to
|
20-07-2020 - 15:34 | 15-07-2020 - 18:15 | |
CVE-2020-14642 | 7.8 |
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: CacheStore). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenti
|
20-07-2020 - 15:33 | 15-07-2020 - 18:15 | |
CVE-2020-14630 | 7.5 |
Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications Applications (component: File Upload). Supported versions that are affected are 8.1.0, 8.2.0 and 8.3.0. Easily exploitable vulnerability allows high pri
|
20-07-2020 - 15:32 | 15-07-2020 - 18:15 | |
CVE-2020-14671 | 5.8 |
Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with netw
|
20-07-2020 - 15:29 | 15-07-2020 - 18:15 | |
CVE-2020-14640 | 5.8 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample apps). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthentica
|
20-07-2020 - 15:28 | 15-07-2020 - 18:15 | |
CVE-2020-14670 | 5.8 |
Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: Settings). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attack
|
20-07-2020 - 15:28 | 15-07-2020 - 18:15 | |
CVE-2020-14668 | 5.8 |
Vulnerability in the Oracle E-Business Intelligence product of Oracle E-Business Suite (component: DBI Setups). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network acce
|
20-07-2020 - 15:28 | 15-07-2020 - 18:15 | |
CVE-2020-14667 | 4.9 |
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with
|
20-07-2020 - 15:28 | 15-07-2020 - 18:15 | |
CVE-2020-14669 | 5.8 |
Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to
|
20-07-2020 - 15:28 | 15-07-2020 - 18:15 | |
CVE-2020-14666 | 5.8 |
Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: Message Display). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with
|
20-07-2020 - 15:26 | 15-07-2020 - 18:15 | |
CVE-2020-14598 | 6.4 |
Vulnerability in the Oracle CRM Gateway for Mobile Devices product of Oracle E-Business Suite (component: Setup of Mobile Applications). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated a
|
20-07-2020 - 15:09 | 15-07-2020 - 18:15 | |
CVE-2020-14545 | 3.3 |
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Device Driver Utility). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where O
|
20-07-2020 - 15:05 | 15-07-2020 - 18:15 | |
CVE-2020-14599 | 6.4 |
Vulnerability in the Oracle CRM Gateway for Mobile Devices product of Oracle E-Business Suite (component: Setup of Mobile Applications). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated a
|
20-07-2020 - 15:01 | 15-07-2020 - 18:15 | |
CVE-2020-14622 | 4.0 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high pr
|
20-07-2020 - 14:52 | 15-07-2020 - 18:15 | |
CVE-2020-14603 | 5.0 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
17-07-2020 - 21:45 | 15-07-2020 - 18:15 | |
CVE-2020-14604 | 5.0 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
17-07-2020 - 21:45 | 15-07-2020 - 18:15 | |
CVE-2020-14569 | 5.5 |
Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerabilit
|
17-07-2020 - 20:54 | 15-07-2020 - 18:15 | |
CVE-2020-14570 | 5.8 |
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Mobile Service). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker
|
17-07-2020 - 20:45 | 15-07-2020 - 18:15 | |
CVE-2020-14572 | 4.3 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated
|
17-07-2020 - 20:37 | 15-07-2020 - 18:15 | |
CVE-2020-14574 | 3.0 |
Vulnerability in the Oracle Communications Interactive Session Recorder product of Oracle Communications Applications (component: FACE). Supported versions that are affected are 6.1-6.4. Difficult to exploit vulnerability allows high privileged attac
|
17-07-2020 - 20:37 | 15-07-2020 - 18:15 | |
CVE-2020-14543 | 4.4 |
Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Installation). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attack
|
17-07-2020 - 20:36 | 15-07-2020 - 18:15 | |
CVE-2020-14587 | 5.5 |
Vulnerability in the PeopleSoft Enterprise FIN Expenses product of Oracle PeopleSoft (component: Expenses). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to
|
17-07-2020 - 20:35 | 15-07-2020 - 18:15 | |
CVE-2020-14584 | 4.3 |
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with
|
17-07-2020 - 20:34 | 15-07-2020 - 18:15 | |
CVE-2020-14585 | 4.3 |
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Mobile Service). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker
|
17-07-2020 - 20:34 | 15-07-2020 - 18:15 | |
CVE-2020-14582 | 4.3 |
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: User Registration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with netw
|
17-07-2020 - 20:34 | 15-07-2020 - 18:15 | |
CVE-2020-14580 | 6.0 |
Vulnerability in the Oracle Communications Session Border Controller product of Oracle Communications Applications (component: System Admin). Supported versions that are affected are 8.1.0, 8.2.0 and 8.3.0. Easily exploitable vulnerability allows low
|
17-07-2020 - 20:33 | 15-07-2020 - 18:15 | |
CVE-2020-14537 | 4.7 |
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Packaging Scripts). The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle
|
17-07-2020 - 19:15 | 15-07-2020 - 18:15 | |
CVE-2020-14549 | 4.0 |
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Server). Supported versions that are affected are 16.1.0.0-16.1.5.1, 18.0.0.0-18.0.2.0 and 19.0.0.0. Difficult to exploit vulnerability
|
17-07-2020 - 18:58 | 15-07-2020 - 18:15 | |
CVE-2020-14541 | 2.1 |
Vulnerability in the Hyperion Financial Close Management product of Oracle Hyperion (component: Close Manager). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access
|
17-07-2020 - 18:54 | 15-07-2020 - 18:15 | |
CVE-2020-2971 | 4.9 |
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access
|
17-07-2020 - 17:50 | 15-07-2020 - 18:15 | |
CVE-2020-14605 | 4.0 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
17-07-2020 - 15:23 | 15-07-2020 - 18:15 | |
CVE-2020-14606 | 10.0 |
Vulnerability in the Oracle SD-WAN Edge product of Oracle Communications Applications (component: User Interface). Supported versions that are affected are 8.2 and 9.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc
|
17-07-2020 - 15:22 | 15-07-2020 - 18:15 | |
CVE-2020-14546 | 2.1 |
Vulnerability in the Hyperion Financial Close Management product of Oracle Hyperion (component: Close Manager). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access
|
16-07-2020 - 16:37 | 15-07-2020 - 18:15 | |
CVE-2020-14613 | 4.3 |
Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced User Interface). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker
|
16-07-2020 - 16:13 | 15-07-2020 - 18:15 | |
CVE-2020-14610 | 3.5 |
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments / File Upload). The supported version that is affected is 12.2.9. Easily exploitable vulnerability allows low privileged attacker with netwo
|
16-07-2020 - 16:07 | 15-07-2020 - 18:15 | |
CVE-2020-14615 | 4.3 |
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit
|
16-07-2020 - 16:07 | 15-07-2020 - 18:15 | |
CVE-2020-14607 | 4.3 |
Vulnerability in the Oracle Fusion Middleware MapViewer product of Oracle Fusion Middleware (component: Tile Server). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker
|
16-07-2020 - 16:04 | 15-07-2020 - 18:15 | |
CVE-2020-14609 | 7.5 |
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web Answers). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable
|
16-07-2020 - 15:59 | 15-07-2020 - 18:15 | |
CVE-2020-14616 | 4.0 |
Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Reporting). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows high privileged attacker
|
16-07-2020 - 14:07 | 15-07-2020 - 18:15 | |
CVE-2020-14612 | 5.5 |
Vulnerability in the PeopleSoft Enterprise HRMS product of Oracle PeopleSoft (component: Time and Labor). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to c
|
16-07-2020 - 14:03 | 15-07-2020 - 18:15 | |
CVE-2020-14611 | 7.5 |
Vulnerability in the Oracle WebCenter Portal product of Oracle Fusion Middleware (component: Composer). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network
|
16-07-2020 - 14:03 | 15-07-2020 - 18:15 | |
CVE-2017-10140 | 4.6 |
Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 might allow local users to gain privileges by leveraging undocumented functionality in Berkeley DB 2.x and later, related to reading settings from DB_CONFIG in th
|
15-07-2020 - 18:15 | 16-04-2018 - 17:29 | |
CVE-2018-6798 | 5.0 |
An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
|
15-07-2020 - 03:15 | 17-04-2018 - 20:29 | |
CVE-2015-8607 | 7.5 |
The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted st
|
15-07-2020 - 03:15 | 13-01-2016 - 15:59 | |
CVE-2018-18312 | 7.5 |
Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
|
15-07-2020 - 03:15 | 05-12-2018 - 22:29 | |
CVE-2015-8608 | 7.5 |
The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.
|
15-07-2020 - 03:15 | 07-02-2017 - 15:59 | |
CVE-2016-6814 | 7.5 |
When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible f
|
15-07-2020 - 03:15 | 18-01-2018 - 18:29 | |
CVE-2018-18313 | 6.4 |
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
|
15-07-2020 - 03:15 | 07-12-2018 - 21:29 | |
CVE-2018-18314 | 7.5 |
Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
|
15-07-2020 - 03:15 | 07-12-2018 - 21:29 | |
CVE-2016-5019 | 7.5 |
CoreResponseStateManager in Apache MyFaces Trinidad 1.0.0 through 1.0.13, 1.2.x before 1.2.15, 2.0.x before 2.0.2, and 2.1.x before 2.1.2 might allow attackers to conduct deserialization attacks via a crafted serialized view state string.
|
15-07-2020 - 03:15 | 03-10-2016 - 18:59 | |
CVE-2016-4000 | 7.5 |
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
|
15-07-2020 - 03:15 | 06-07-2017 - 16:29 | |
CVE-2017-12837 | 5.0 |
Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and th
|
15-07-2020 - 03:15 | 19-09-2017 - 18:29 | |
CVE-2016-1181 | 6.8 |
ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart reques
|
15-07-2020 - 03:15 | 04-07-2016 - 22:59 | |
CVE-2016-1182 | 6.4 |
ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related iss
|
15-07-2020 - 03:15 | 04-07-2016 - 22:59 | |
CVE-2017-12610 | 4.9 |
In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implem
|
15-07-2020 - 03:15 | 26-07-2018 - 14:29 | |
CVE-2017-12814 | 7.5 |
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
|
15-07-2020 - 03:15 | 28-09-2017 - 01:29 | |
CVE-2017-12883 | 6.4 |
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular exp
|
15-07-2020 - 03:15 | 19-09-2017 - 18:29 | |
CVE-2018-1000004 | 7.1 |
In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
|
15-07-2020 - 03:15 | 16-01-2018 - 20:29 | |
CVE-2017-0861 | 4.6 |
Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
|
15-07-2020 - 03:15 | 16-11-2017 - 23:29 |