
CVE-2019-2479
https://notcve.org/view.php?id=CVE-2019-2479
16 Jan 2019 — Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Tech... • http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html •

CVE-2019-2480
https://notcve.org/view.php?id=CVE-2019-2480
16 Jan 2019 — Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a... • http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html •

CVE-2018-20584 – Gentoo Linux Security Advisory 201908-03
https://notcve.org/view.php?id=CVE-2018-20584
30 Dec 2018 — JasPer 2.0.14 allows remote attackers to cause a denial of service (application hang) via an attempted conversion to the jp2 format. JasPer 2.0.14 permite que los atacantes remotos provoquen una denegación de servicio (bloqueo de la aplicación) mediante un intento de conversión al formato jp2. Multiple vulnerabilities have been found in JasPer, the worst of which could result in a Denial of Service condition. Versions less than or equal to 2.0.16 are affected. • http://www.securityfocus.com/bid/106356 •

CVE-2018-18223
https://notcve.org/view.php?id=CVE-2018-18223
19 Oct 2018 — Open Design Alliance Drawings SDK 2019Update1 has a vulnerability during the reading of malformed files, allowing attackers to obtain sensitive information from process memory or cause a crash. Open Design Alliance Drawings SDK 2019Update1 tiene una vulnerabilidad durante la lectura de archivos mal formados, lo que permite que los atacantes obtengan información sensible de la memoria del proceso o provoquen un cierre inesperado. • http://www.securityfocus.com/bid/105603 •

CVE-2018-18224
https://notcve.org/view.php?id=CVE-2018-18224
19 Oct 2018 — A vulnerability exists in the file reading procedure in Open Design Alliance Drawings SDK 2019Update1 on non-Windows platforms in which attackers could perform read operations past the end, or before the beginning, of the intended buffer. This can allow attackers to obtain sensitive information from process memory or cause a crash. Existe una vulnerabilidad en el procedimiento de lectura de archivos de Open Design Alliance Drawings SDK 2019Update1 en plataformas diferentes de Windows por la cual los atacant... • http://www.securityfocus.com/bid/105603 • CWE-125: Out-of-bounds Read •

CVE-2018-3217
https://notcve.org/view.php?id=CVE-2018-3217
17 Oct 2018 — Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete ac... • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html •

CVE-2018-3218
https://notcve.org/view.php?id=CVE-2018-3218
17 Oct 2018 — Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete ac... • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html •

CVE-2018-3219
https://notcve.org/view.php?id=CVE-2018-3219
17 Oct 2018 — Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete ac... • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html •

CVE-2018-3220
https://notcve.org/view.php?id=CVE-2018-3220
17 Oct 2018 — Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete ac... • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html •

CVE-2018-3221
https://notcve.org/view.php?id=CVE-2018-3221
17 Oct 2018 — Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently ... • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html •