Oracle

Financial Services Crime And Compliance Management Studio

22 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 90.79%
  • Veröffentlicht 19.05.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:47:43

In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular ex...

  • EPSS 0.39%
  • Veröffentlicht 19.05.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:47:43

Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt roun...

  • EPSS 0.38%
  • Veröffentlicht 12.05.2022 20:15:15
  • Zuletzt bearbeitet 21.11.2024 06:47:43

In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.

  • EPSS 0.18%
  • Veröffentlicht 12.05.2022 20:15:15
  • Zuletzt bearbeitet 21.11.2024 06:47:42

In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model o...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 06.05.2022 12:15:08
  • Zuletzt bearbeitet 21.11.2024 06:51:10

Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local in...

  • EPSS 2.66%
  • Veröffentlicht 01.05.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:52:30

The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.

Exploit
  • EPSS 0.6%
  • Veröffentlicht 11.03.2022 07:15:07
  • Zuletzt bearbeitet 27.08.2025 21:15:36

jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.

  • EPSS 0.88%
  • Veröffentlicht 10.03.2022 09:15:07
  • Zuletzt bearbeitet 21.11.2024 06:16:44

Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. ...

  • EPSS 0.23%
  • Veröffentlicht 27.01.2022 13:15:08
  • Zuletzt bearbeitet 21.11.2024 06:48:08

The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privi...

  • EPSS 0.09%
  • Veröffentlicht 24.01.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:48:33

There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolon...