Page 6 of 29 results (0.007 seconds)

CVSS: 9.8EPSS: 96%CPEs: 6EXPL: 6

The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product. El componente WLS Security en Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0 y 12.2.1.0 permite a atacantes remotos ejecutar comandos arbitrarios a través de un objeto Java serializado manipulado en el tráfico del protocolo T3 al puerto 7001 TCP, relacionado con oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTA: el alcance de esta CVE se limita al producto WebLogic Server. Oracle WebLogic Server contains a deserialization of untrusted data vulnerability within Apache Commons, which can allow for for remote code execution. • https://www.exploit-db.com/exploits/42806 https://www.exploit-db.com/exploits/46628 https://www.exploit-db.com/exploits/44552 https://github.com/nex1less/CVE-2015-4852 http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html http://www.openwall.com/lists/oss-security/2015/11/17/19 http://www.oracle. • CWE-502: Deserialization of Untrusted Data •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack." La librería Bouncy Castle Java en versiones anteriores a 1.51 no valida un punto que se encuentra dentro de la curva elíptica, lo que facilita a atacantes remotos obtener claves privadas a través de una serie de intercambios de clave de curva elíptica Diffie Hellman (ECDH) manipulados, también conocida como un 'ataque de curva no válida'. It was found that bouncycastle is vulnerable to an invalid curve attack. An attacker could extract private keys used in elliptic curve cryptography with a few thousand queries. • http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html http://rhn.redhat.com/errata/RHSA-2016-2035.html http://rhn.redhat.com/errata/RHSA-2016-2036.html http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html http://www.debian.org/security/2015/dsa-3417 http://www.openwall.com/lists/oss-security/2015/10/22/7 http://www.openwall.com/lists/oss-security • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-310: Cryptographic Issues CWE-358: Improperly Implemented Security Check for Standard •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

The VirtualBox 2.0.8 and 2.0.10 web service in Sun Virtual Desktop Infrastructure (VDI) 3.0 does not require authentication, which allows remote attackers to obtain unspecified access via vectors involving requests to an Apache HTTP Server. El servicio Web de VirtualBox v2.0.8 y v2.0.10 en Sun Virtual Desktop Infrastructure (VDI) v3.0 no requiere autenticación, lo que permite a atacantes remotos conseguir acceso no especificado a través de vectores que implican peticiones al servidor Apache HTTP Server. • http://sunsolve.sun.com/search/document.do?assetkey=1-21-141481-03-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-268328-1 http://www.securityfocus.com/bid/36917 https://exchange.xforce.ibmcloud.com/vulnerabilities/54136 • CWE-287: Improper Authentication •

CVSS: 3.5EPSS: 0%CPEs: 4EXPL: 0

Sun Virtual Desktop Infrastructure (VDI) 3.0, when anonymous binding is enabled, does not properly handle a client's attempt to establish an authenticated and encrypted connection, which might allow remote attackers to read cleartext VDI configuration-data requests by sniffing LDAP sessions on the network. Sun Virtual Desktop Infrastructure (VDI) v3.0, cuando la vinculación anónima esta activada, no se maneja adecuadamente el intento del cliente de establecer una conexión cifrada y autenticada, lo que permitiría a atacantes remotos leer las peticiones de datos de configuración mediante el escaneo de las sesiones de LDAP en la red. • http://secunia.com/advisories/36330 http://sunsolve.sun.com/search/document.do?assetkey=1-21-141481-02-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-265488-1 http://www.vupen.com/english/advisories/2009/2282 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •