Oracle

Communications Session Border Controller

22 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 19.05.2020 19:15:09
  • Zuletzt bearbeitet 21.11.2024 04:55:55

A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out...

  • EPSS 0.13%
  • Veröffentlicht 19.05.2020 19:15:09
  • Zuletzt bearbeitet 21.11.2024 04:55:55

A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.

  • EPSS 1.67%
  • Veröffentlicht 08.11.2019 15:15:11
  • Zuletzt bearbeitet 07.07.2025 14:15:21

A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.

  • EPSS 8.33%
  • Veröffentlicht 16.09.2019 19:15:10
  • Zuletzt bearbeitet 21.11.2024 04:45:01

Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.

  • EPSS 4.69%
  • Veröffentlicht 16.09.2019 19:15:10
  • Zuletzt bearbeitet 21.11.2024 04:45:01

Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.

  • EPSS 5.05%
  • Veröffentlicht 27.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:36:48

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...

Exploit
  • EPSS 1.24%
  • Veröffentlicht 11.01.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:28

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remo...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 11.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:28

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash s...

  • EPSS 0.8%
  • Veröffentlicht 18.05.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:58

An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

  • EPSS 0.89%
  • Veröffentlicht 18.05.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:57

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer over...