Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Oracle Communications Application Session Controller 3.9m0p1 WS/WEB Remote Code Execution

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Oracle Communications Application Session Controller 3.9m0p1 WS/WEB Remote Code Execution


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vuldb.com

A vulnerability classified as very critical has been found in Oracle Communications Application Session Controller 3.9m0p1 (Cloud Software). This affects an unknown functionality of the component WS/WEB. Upgrading eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability. ...



๐Ÿ“Œ Oracle Communications Application Session Controller 3.9m0p1 WS/WEB Remote Code Execution


๐Ÿ“ˆ 86.55 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller 3.9m0p1 WS/WEB Remote Code Execution


๐Ÿ“ˆ 86.55 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller 3.9m0p1 WS/WEB information disclosure


๐Ÿ“ˆ 73.43 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller 3.9m0p3 Bouncy Castle Java Library Remote Code Execution


๐Ÿ“ˆ 49.32 Punkte

๐Ÿ“Œ CVE-2021-23450 | Oracle Communications WebRTC Session Controller 7.2.0/7.2.1 Platform Remote Code Execution


๐Ÿ“ˆ 43.19 Punkte

๐Ÿ“Œ Oracle Communications Evolved Communications Application Server Universal Data Record Remote Code Execution


๐Ÿ“ˆ 42.51 Punkte

๐Ÿ“Œ Oracle Communications BRM 3.x Application Session Controller information disclosure


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller up to 3.7.0 OpenSSL information disclosure


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller up to 3.7.0 Apache Commons Collections privilege escalation


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller up to 3.7.0 Glibc Ghost memory corruption


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller 3.8m0 unknown vulnerability


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller 3.9m0p2 Eclipse Jetty Local Privilege Escalation


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller 3.9m0p2 Apache Batik server-side request forgery


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ Oracle Communications Application Session Controller 3.9m0p3 Security server-side request forgery


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ Oracle Communications Session Route Manager 8.2.0/8.2.1/8.2.2 Remote Code Execution


๐Ÿ“ˆ 36 Punkte

๐Ÿ“Œ Oracle Communications Session Report Manager 8.2.0/8.2.1/8.2.2 Remote Code Execution


๐Ÿ“ˆ 36 Punkte

๐Ÿ“Œ Oracle Communications Session Route Manager 8.2.0/8.2.1/8.2.2 Remote Code Execution


๐Ÿ“ˆ 36 Punkte

๐Ÿ“Œ Oracle Communications Session Report Manager 8.2.0/8.2.1/8.2.2 Remote Code Execution


๐Ÿ“ˆ 36 Punkte

๐Ÿ“Œ Oracle Communications Session Route Manager 8.2.0/8.2.1/8.2.2 Remote Code Execution


๐Ÿ“ˆ 36 Punkte

๐Ÿ“Œ Oracle Communications Session Route Manager 8.2.0/8.2.1/8.2.2 Remote Code Execution


๐Ÿ“ˆ 36 Punkte

๐Ÿ“Œ Oracle Communications Session Report Manager 8.2.0/8.2.1/8.2.2 Remote Code Execution


๐Ÿ“ˆ 36 Punkte

๐Ÿ“Œ CVE-2023-21890 | Oracle Communications Converged Application Server 7.1.0/8.0.0 Core Remote Code Execution


๐Ÿ“ˆ 33.14 Punkte

๐Ÿ“Œ Gogs 0.11.66 Session ID go-macaron/session Remote Code Execution


๐Ÿ“ˆ 31.1 Punkte

๐Ÿ“Œ Gitea up to 1.5.3 Session ID go-macaron/session Remote Code Execution


๐Ÿ“ˆ 31.1 Punkte

๐Ÿ“Œ Oracle Communications Session Border Controller SCZ7.3.0/SCZ7.4.0 Routing unknown vulnerability


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications Session Border Controller SCZ7.3.0/SCZ7.4.0 Sysadmin information disclosure


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications Session Border Controller SCZ7.3.0/SCZ7.4.0 Sysadmin memory corruption


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications Session Border Controller SCZ7.3.0/SCZ7.4.0 Routing denial of service


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications Session Border Controller SCZ7.3.0/SCZ7.4.0 Sysadmin information disclosure


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications WebRTC Session Controller 7.0/7.1/7.2 Apache Groovy memory corruption


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications WebRTC Session Controller 7.0/7.1/7.2 Apache Commons Collections memory corruption


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications WebRTC Session Controller 7.0/7.1/7.2 BeanUtils memory corruption


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications WebRTC Session Controller 7.0/7.1/7.2 Spring cross site request forgery


๐Ÿ“ˆ 30.07 Punkte

๐Ÿ“Œ Oracle Communications WebRTC Session Controller 7.0/7.1/7.2 Gson denial of service


๐Ÿ“ˆ 30.07 Punkte











matomo