Oracle

Financial Services Analytical Applications Infrastructure

90 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.74%
  • Veröffentlicht 13.07.2021 08:15:07
  • Zuletzt bearbeitet 21.11.2024 06:13:08

When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services th...

  • EPSS 0.25%
  • Veröffentlicht 27.05.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:49:32

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or ...

Exploit
  • EPSS 46.1%
  • Veröffentlicht 23.04.2021 15:15:09
  • Zuletzt bearbeitet 21.11.2024 05:56:01

Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves int...

  • EPSS 0.8%
  • Veröffentlicht 22.04.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 06:02:27

Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Rules Framework). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabili...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 13.04.2021 07:15:12
  • Zuletzt bearbeitet 21.11.2024 06:01:04

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but ...

  • EPSS 0.5%
  • Veröffentlicht 26.01.2021 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:00

It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).

  • EPSS 0.62%
  • Veröffentlicht 26.01.2021 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:00

It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted text into the Styles input of specific dialogs (in the Advanced Tab for Dialogs plugin).

  • EPSS 1.01%
  • Veröffentlicht 12.11.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:20:50

A cross-site scripting (XSS) vulnerability in the Color Dialog plugin for CKEditor 4.15.0 allows remote attackers to run arbitrary web script after persuading a user to copy and paste crafted HTML code into one of editor inputs.

  • EPSS 0.82%
  • Veröffentlicht 12.11.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:32:32

Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make ...

  • EPSS 1.13%
  • Veröffentlicht 21.10.2020 15:15:21
  • Zuletzt bearbeitet 21.11.2024 05:04:15

Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerabilit...