Oracle

Blockchain Platform

39 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 22.55%
  • Veröffentlicht 29.04.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:36

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This prob...

Exploit
  • EPSS 4.86%
  • Veröffentlicht 24.02.2020 18:15:22
  • Zuletzt bearbeitet 21.11.2024 05:33:45

Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating fe...

  • EPSS 3.16%
  • Veröffentlicht 14.01.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:22:45

When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring...

  • EPSS 0.26%
  • Veröffentlicht 20.08.2019 21:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:22

In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by defa...

  • EPSS 5.75%
  • Veröffentlicht 26.07.2019 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:11

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simpl...

  • EPSS 1.14%
  • Veröffentlicht 26.07.2019 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:24:07

An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not pro...

  • EPSS 2.84%
  • Veröffentlicht 18.12.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd...

  • EPSS 0.11%
  • Veröffentlicht 05.09.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root s...

Exploit
  • EPSS 38.97%
  • Veröffentlicht 29.05.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.