• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

oracle

  1. 1

    Exploits Oracle Mojarra JSF / Eclipse Mojarra JSF 2.2 / 2.3 Cross Site Scripting

    Oracle Mojarra JSF included in Java EE 7 and Eclipse Mojarra JSF versions 2.2 and 2.3 suffer from a cross site scripting vulnerability. View the full article
  2. 1

    Exploits Oracle Hyperion Planning 11.1.2.3 XML Injection

    Oracle Hyperion Planning version 11.1.2.3 suffer from an XML external entity injection vulnerability. View the full article
  3. 1

    Exploits Oracle Siebel CRM 19.0 Cross Site Scripting

    Oracle Siebel CRM version 19.0 suffers from a persistent cross site scripting vulnerability. View the full article
  4. 1

    Exploits Oracle Application Testing Suite WebLogic Server Administration Console War Deployment

    This Metasploit module abuses a feature in WebLogic Server's Administration Console to install a malicious Java application in order to gain remote code execution. Authentication is required, however by default, Oracle ships with a "oats" account that you could log in with, which grants you...
  5. 1

    Exploits Oracle Weblogic Server Deserialization Remote Code Execution

    An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host. View the full article
  6. 1

    Exploits Oracle Business Intelligence Directory Traversal

    Oracle Business Intelligence versions 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0 suffer from a directory traversal vulnerability. View the full article
  7. 1

    Exploits Oracle Business Intelligence And XML Publisher XML Injection

    Oracle Business Intelligence and XML Publisher versions 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0 suffer from an XML external entity injection vulnerability. View the full article
  8. 1

    Exploits Oracle Java Runtime Environment GlyphIterator::setCurrGlyphID Heap Corruption

    A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType fonts. View the full article
  9. 1

    Exploits Oracle Java Runtime Environment sc_FindExtrema4 Heap Corruption

    A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType, implemented in a proprietary t2k library. View the full article
  10. 1

    Exploits Oracle Weblogic Server Deserialization RMI UnicastRef Remote Code Execution

    An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a serialized object (sun.rmi.server.UnicastRef) to the interface to execute code on vulnerable hosts. View the full article
  11. 1

    Exploits Oracle Weblogic Server Deserialization MarshalledObject Remote Code Execution

    An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a serialized object (weblogic.corba.utils.MarshalledObject) to the interface to execute code on vulnerable hosts. View the full article
  12. 1

    Exploits Oracle Weblogic Server Deserialization Remote Code Execution

    This Metasploit module demonstrates that an unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a serialized object (weblogic.jms.common.StreamMessag eImpl) to the interface to execute code on vulnerable hosts. View the full article
  13. 1

    Exploits Oracle Weblogic Server Deserialization Remote Command Execution

    Oracle Weblogic Server deserialization remote command execution exploit with patch bypass. View the full article
  14. 1

    Exploits Oracle Java Runtime Environment TTF Font Heap Out-Of-Bounds Read

    A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in AlternateSubstitutionSubtable::process. View the full article
  15. 1

    Exploits Oracle Java Runtime Environment TTF Font Heap Out-Of-Bounds Read

    A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in ExtractBitMap_blocClass. View the full article
  16. 1

    Exploits Oracle Java Runtime Environment TTF Font Heap Out-Of-Bounds Read

    A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in OpenTypeLayoutEngine::adjustGlyphPositions. View the full article
  17. 1

    Exploits Oracle Java Runtime Environment OpenType Font Heap Out-Of-Bounds Read

    A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of OpenType fonts. View the full article
  18. 1

    Exploits Navicat For Oracle 12.1.15 Denial Of Service

    Navicat for Oracle version 12.1.15 suffers from a denial of service vulnerability. View the full article
  19. D

    Debian'da Oracle Java 8 Nasıl Depolanır [JDK8]

    Hidden content
  20. 1

    Exploits Oracle Reports Developer 12.2.1.3 Cross Site Scripting

    Oracle Reports Developer component version 12.2.1.3 suffers from a cross site scripting vulnerability. View the full article
Back
Top