Page 3 of 12 results (0.002 seconds)

CVSS: 5.0EPSS: 46%CPEs: 2EXPL: 1

Unspecified vulnerability in the Oracle GoldenGate component in Oracle GoldenGate 11.2 and 12.1.2 allows remote attackers to affect availability via unknown vectors. Vulnerabilidad no especificada en el componente Oracle GoldenGate en Oracle GoldenGate 11.2 y 12.1.2 permite a atacantes remotos afectar a la disponibilidad a través de vectores desconocidos. This vulnerability allows remote attackers to cause a denial condition on vulnerable installations of Oracle GoldenGate. Authentication is not required to exploit this vulnerability. The specific flaw exists within the GoldenGate mgr process, which listens on TCP port 7809. By default, this process does not require authentication before accepting data delivery and GGSCI commands from a remote machine. • http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html http://www.securityfocus.com/bid/81117 http://www.zerodayinitiative.com/advisories/ZDI-16-021 https://redr2e.com/cve-to-poc-cve-2016-0450 •

CVSS: 10.0EPSS: 77%CPEs: 2EXPL: 0

Unspecified vulnerability in the Oracle GoldenGate component in Oracle GoldenGate 11.2 and 12.1.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2016-0451. Vulnerabilidad no especificada en el componente Oracle GoldenGate en Oracle GoldenGate 11.2 y 12.1.2 permite a atacantes remotos afectar a la confidencialidad, la integridad y la disponibilidad a través de vectores desconocidos, una vulnerabilidad diferente a CVE-2016-0451. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle GoldenGate. Authentication is not required to exploit this vulnerability. The specific flaw exists within the GoldenGate mgr process, which listens on TCP port 7809. By default, the process does not authenticate connecting machines prior to allowing them to write arbitrary files with whitelisted names on the server. • http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html http://www.securityfocus.com/bid/81122 http://www.zerodayinitiative.com/advisories/ZDI-16-023 •