Max CVSS | 8.8 | Min CVSS | 1.2 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-3145 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple pr
|
31-05-2023 - 13:36 | 17-10-2018 - 01:31 | |
CVE-2018-3137 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple
|
31-05-2023 - 13:36 | 17-10-2018 - 01:31 | |
CVE-2018-3170 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple prot
|
31-05-2023 - 13:36 | 17-10-2018 - 01:31 | |
CVE-2018-3182 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple proto
|
31-05-2023 - 13:32 | 17-10-2018 - 01:31 | |
CVE-2018-3280 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: JSON). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pro
|
31-05-2023 - 13:24 | 17-10-2018 - 01:31 | |
CVE-2018-3203 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple
|
31-05-2023 - 13:24 | 17-10-2018 - 01:31 | |
CVE-2018-3279 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via m
|
31-05-2023 - 13:24 | 17-10-2018 - 01:31 | |
CVE-2018-3212 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Information Schema). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access vi
|
31-05-2023 - 13:24 | 17-10-2018 - 01:31 | |
CVE-2018-3195 | 5.5 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple prot
|
31-05-2023 - 13:22 | 17-10-2018 - 01:31 | |
CVE-2018-3186 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multipl
|
31-05-2023 - 13:21 | 17-10-2018 - 01:31 | |
CVE-2018-3285 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Windows). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple
|
31-05-2023 - 13:21 | 17-10-2018 - 01:31 | |
CVE-2018-3286 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access v
|
31-05-2023 - 13:19 | 17-10-2018 - 01:31 | |
CVE-2018-0417 | 4.6 |
A vulnerability in TACACS authentication with Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to perform certain operations within the GUI that are not normally available to that user on the CLI. The vulnerab
|
26-04-2023 - 18:51 | 17-10-2018 - 22:29 | |
CVE-2018-0395 | 2.9 |
A vulnerability in the Link Layer Discovery Protocol (LLDP) implementation for Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition when the device unexpectedly re
|
20-04-2023 - 17:17 | 17-10-2018 - 19:29 | |
CVE-2018-0420 | 4.0 |
A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request paramet
|
03-02-2023 - 19:21 | 17-10-2018 - 22:29 | |
CVE-2018-0388 | 3.5 |
A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web-based interface of an affected system.
|
03-02-2023 - 02:09 | 17-10-2018 - 19:29 | |
CVE-2018-3174 | 1.9 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows
|
06-12-2022 - 21:33 | 17-10-2018 - 01:31 | |
CVE-2018-3282 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability
|
08-11-2022 - 19:32 | 17-10-2018 - 01:31 | |
CVE-2018-3251 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with
|
04-08-2022 - 19:34 | 17-10-2018 - 01:31 | |
CVE-2018-3156 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with
|
04-08-2022 - 19:33 | 17-10-2018 - 01:31 | |
CVE-2018-3143 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with
|
04-08-2022 - 19:31 | 17-10-2018 - 01:31 | |
CVE-2018-3133 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows lo
|
01-08-2022 - 15:46 | 17-10-2018 - 01:31 | |
CVE-2018-3139 | 2.6 |
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows un
|
27-06-2022 - 17:34 | 17-10-2018 - 01:31 | |
CVE-2018-3136 | 2.6 |
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unau
|
27-06-2022 - 17:34 | 17-10-2018 - 01:31 | |
CVE-2018-3180 | 6.8 |
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit v
|
27-06-2022 - 17:33 | 17-10-2018 - 01:31 | |
CVE-2018-3149 | 5.1 |
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit v
|
27-06-2022 - 17:33 | 17-10-2018 - 01:31 | |
CVE-2018-3183 | 6.8 |
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerabil
|
27-06-2022 - 17:33 | 17-10-2018 - 01:31 | |
CVE-2018-3214 | 5.0 |
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulner
|
27-06-2022 - 17:27 | 17-10-2018 - 01:31 | |
CVE-2018-6974 | 7.2 |
VMware ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds read vulnerability in SVGA device. This iss
|
02-06-2022 - 19:19 | 16-10-2018 - 19:29 | |
CVE-2018-0381 | 5.5 |
A vulnerability in the Cisco Aironet Series Access Points (APs) software could allow an authenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to
|
13-09-2021 - 11:21 | 17-10-2018 - 22:29 | |
CVE-2017-14735 | 4.3 |
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL.
|
20-07-2021 - 23:15 | 25-09-2017 - 21:29 | |
CVE-2018-0739 | 4.3 |
Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used w
|
20-07-2021 - 23:15 | 27-03-2018 - 21:29 | |
CVE-2015-9251 | 4.3 |
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
|
08-01-2021 - 12:15 | 18-01-2018 - 23:29 | |
CVE-2018-0442 | 5.0 |
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the
|
22-10-2020 - 16:46 | 17-10-2018 - 22:29 | |
CVE-2018-17929 | 6.8 |
In Delta Industrial Automation TPEditor, TPEditor Versions 1.90 and prior, multiple stack-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files lacking user input validation before copying data from proj
|
18-09-2020 - 16:16 | 11-10-2018 - 22:29 | |
CVE-2018-0443 | 5.0 |
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vu
|
28-08-2020 - 18:56 | 17-10-2018 - 22:29 | |
CVE-2018-8569 | 6.8 |
A remote code execution vulnerability exists in the Yammer desktop application due to the loading of arbitrary content, aka "Yammer Desktop Application Remote Code Execution Vulnerability." This affects Yammer Desktop App.
|
24-08-2020 - 17:37 | 23-10-2018 - 17:29 | |
CVE-2018-18484 | 4.3 |
An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames:
|
24-08-2020 - 17:37 | 18-10-2018 - 21:29 | |
CVE-2018-3237 | 5.0 |
Vulnerability in the Oracle Applications Manager component of Oracle E-Business Suite (subcomponent: Support Cart). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows un
|
24-08-2020 - 17:37 | 17-10-2018 - 01:31 | |
CVE-2018-2913 | 7.5 |
Vulnerability in the Oracle GoldenGate component of Oracle GoldenGate (subcomponent: Monitoring Manager). Supported versions that are affected are 12.1.2.1.0, 12.2.0.2.0 and 12.3.0.1.0. Easily exploitable vulnerability allows unauthenticated attacker
|
24-08-2020 - 17:37 | 17-10-2018 - 01:31 | |
CVE-2018-18224 | 5.8 |
A vulnerability exists in the file reading procedure in Open Design Alliance Drawings SDK 2019Update1 on non-Windows platforms in which attackers could perform read operations past the end, or before the beginning, of the intended buffer. This can al
|
24-08-2020 - 17:37 | 19-10-2018 - 22:29 | |
CVE-2018-17474 | 6.8 |
Use after free in HTMLImportsController in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-2902 | 4.0 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Console). Supported versions that are affected are 10.3.6.0 and 12.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network ac
|
24-08-2020 - 17:37 | 17-10-2018 - 01:31 | |
CVE-2018-17471 | 4.3 |
Incorrect dialog placement in WebContents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-18223 | 5.8 |
Open Design Alliance Drawings SDK 2019Update1 has a vulnerability during the reading of malformed files, allowing attackers to obtain sensitive information from process memory or cause a crash.
|
24-08-2020 - 17:37 | 19-10-2018 - 22:29 | |
CVE-2018-17477 | 4.3 |
Incorrect dialog placement in Extensions in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of extension popups via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-17475 | 4.3 |
Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-17476 | 4.3 |
Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-17467 | 4.3 |
Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-17473 | 4.3 |
Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-17462 | 6.8 |
Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-17463 | 6.8 |
Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2018-17464 | 4.3 |
Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
|
24-08-2020 - 17:37 | 14-11-2018 - 15:29 | |
CVE-2016-4000 | 7.5 |
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
|
15-07-2020 - 03:15 | 06-07-2017 - 16:29 | |
CVE-2018-18309 | 4.3 |
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and ap
|
31-10-2019 - 01:15 | 15-10-2018 - 02:29 | |
CVE-2018-18483 | 6.8 |
The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other
|
31-10-2019 - 01:15 | 18-10-2018 - 21:29 | |
CVE-2018-17913 | 6.8 |
A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application.
|
09-10-2019 - 23:37 | 05-11-2018 - 23:29 | |
CVE-2018-17905 | 6.8 |
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object.
|
09-10-2019 - 23:37 | 05-11-2018 - 23:29 | |
CVE-2018-17907 | 4.3 |
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.
|
09-10-2019 - 23:37 | 05-11-2018 - 23:29 | |
CVE-2018-17909 | 6.8 |
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application.
|
09-10-2019 - 23:37 | 05-11-2018 - 23:29 | |
CVE-2018-17927 | 6.8 |
In Delta Industrial Automation TPEditor, TPEditor Versions 1.90 and prior, multiple out-of-bounds write vulnerabilities may be exploited by processing specially crafted project files lacking user input validation, which may cause the system to write
|
09-10-2019 - 23:37 | 11-10-2018 - 22:29 | |
CVE-2018-15395 | 2.7 |
A vulnerability in the authentication and authorization checking mechanisms of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, adjacent attacker to gain network access to a Cisco TrustSec domain. Under normal circumstances,
|
09-10-2019 - 23:35 | 17-10-2018 - 20:29 | |
CVE-2018-14597 | 5.0 |
CA Technologies Identity Governance 12.6, 14.0, 14.1, and 14.2 and CA Identity Suite Virtual Appliance 14.0, 14.1, and 14.2 provide telling error messages that may allow remote attackers to enumerate account names.
|
09-10-2019 - 23:35 | 17-10-2018 - 21:49 | |
CVE-2018-15435 | 4.3 |
A vulnerability in the web-based management interface of Cisco SocialMiner could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability i
|
09-10-2019 - 23:35 | 17-10-2018 - 21:49 | |
CVE-2018-15402 | 6.8 |
A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks. The vulnerability is due to improper validation of Origin headers on HTTP re
|
09-10-2019 - 23:35 | 17-10-2018 - 20:29 | |
CVE-2018-15765 | 2.1 |
Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains an Information Exposure vulnerability. The log file contents store sensitive data including executed commands to generate authentication tokens which may prove useful to an attac
|
09-10-2019 - 23:35 | 18-10-2018 - 22:29 | |
CVE-2018-15438 | 4.3 |
A vulnerability in the web-based management interface of Cisco Prime Collaboration Assurance could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. Th
|
09-10-2019 - 23:35 | 17-10-2018 - 22:29 | |
CVE-2018-11080 | 4.6 |
Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains Improper File Permission Vulnerabilities. The application contains multiple configuration files with world-readable permissions that could allow an authenticated malicious user t
|
09-10-2019 - 23:33 | 18-10-2018 - 22:29 | |
CVE-2018-10933 | 6.4 |
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
|
09-10-2019 - 23:33 | 17-10-2018 - 12:29 | |
CVE-2018-11079 | 2.1 |
Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains a Plaintext Password Storage vulnerability. Database credentials are stored in plaintext in a configuration file. An authenticated malicious user with access to the configuration
|
09-10-2019 - 23:33 | 18-10-2018 - 22:29 | |
CVE-2018-0441 | 6.1 |
A vulnerability in the 802.11r Fast Transition feature set of Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a c
|
09-10-2019 - 23:32 | 17-10-2018 - 22:29 | |
CVE-2018-0456 | 6.8 |
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application of an affected device to restart unexpectedly. The vulnerabili
|
09-10-2019 - 23:32 | 17-10-2018 - 20:29 | |
CVE-2018-0416 | 5.0 |
A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to in
|
09-10-2019 - 23:32 | 17-10-2018 - 19:29 | |
CVE-2018-0378 | 7.8 |
A vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected
|
09-10-2019 - 23:31 | 17-10-2018 - 21:49 | |
CVE-2018-3268 | 5.0 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: SMB Server). The supported version that is affected is 11.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via SMB to co
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3255 | 5.8 |
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Fluid Core). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3295 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3269 | 4.0 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: SMB Server). The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with network access via SMB to com
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3254 | 5.0 |
Vulnerability in the Oracle WebCenter Portal component of Oracle Fusion Middleware (subcomponent: WebCenter Spaces Application). Supported versions that are affected are 11.1.1.9.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticat
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3246 | 5.0 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker wit
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3228 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3181 | 2.1 |
Vulnerability in the Oracle Hospitality Cruise Shipboard Property Management System component of Oracle Hospitality Applications (subcomponent: OHC ENOAD). The supported version that is affected is 8.0. Easily exploitable vulnerability allows low pri
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3151 | 5.0 |
Vulnerability in the Oracle iProcurement component of Oracle E-Business Suite (subcomponent: E-Content Manager Catalog). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vu
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3141 | 5.0 |
Vulnerability in the Hyperion Essbase Administration Services component of Oracle Hyperion (subcomponent: EAS Console). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3287 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3273 | 8.8 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Remote Administration Daemon (RAD)). The supported version that is affected is 11.3. Easily exploitable vulnerability allows unauthenticated attacker with netw
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3261 | 5.0 |
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3234 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3213 | 5.0 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Docker Images). The supported version that is affected is prior to Docker 12.2.1.3.20180913. Easily exploitable vulnerability allows unauthenticated atta
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3201 | 7.5 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). The supported version that is affected is 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3275 | 8.8 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: LibKMIP). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple p
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3259 | 7.5 |
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protoco
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3235 | 5.8 |
Vulnerability in the Oracle Applications Manager component of Oracle E-Business Suite (subcomponent: None). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenti
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3220 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3190 | 5.8 |
Vulnerability in the Oracle E-Business Intelligence component of Oracle E-Business Suite (subcomponent: Overview Page/Report Rendering). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unaut
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3176 | 5.8 |
Vulnerability in the Hyperion Common Events component of Oracle Hyperion (subcomponent: User Interface). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3249 | 4.0 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). The supported version that is affected is 10.3.6.0. Easily exploitable vulnerability allows low privileged attacker with network acc
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3242 | 5.8 |
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: Marketing Administration). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulner
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3227 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3218 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3168 | 5.5 |
Vulnerability in the Oracle Identity Analytics component of Oracle Fusion Middleware (subcomponent: Core Components). The supported version that is affected is 11.1.1.5.8. Easily exploitable vulnerability allows low privileged attacker with network a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3140 | 5.8 |
Vulnerability in the Hyperion Essbase Administration Services component of Oracle Hyperion (subcomponent: EAS Console). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3011 | 5.8 |
Vulnerability in the Oracle Trade Management component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerabi
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-2922 | 1.9 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure whe
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3274 | 6.3 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with network access via SMB to comprom
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3263 | 6.8 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Sudo). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple prot
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3226 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3217 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3244 | 5.0 |
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Attachments / File Upload). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vuln
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3231 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3221 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3204 | 5.8 |
Vulnerability in the Oracle Business Intelligence Enterprise Edition component of Oracle Fusion Middleware (subcomponent: Analytics Server). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3198 | 5.0 |
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Portal). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3188 | 5.8 |
Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Web interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3178 | 5.8 |
Vulnerability in the Hyperion Common Events component of Oracle Hyperion (subcomponent: User Interface). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3158 | 5.5 |
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Emergency Response System). The supported version that is affected is 9.0. Easily exploitable vulnerability allows low privile
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3153 | 5.8 |
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-2971 | 4.0 |
Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: REST Services). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-2909 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3298 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3292 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3265 | 4.4 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Zones). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure whe
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3238 | 4.9 |
Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 11.1.1.8.0. Easily exploitable vulnerability allows high privileged attacker with network access
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3289 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3276 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3262 | 4.3 |
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Stylesheet). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3250 | 5.8 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). The supported version that is affected is 10.3.6.0. Easily exploitable vulnerability allows unauthenticated attacker with network ac
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3243 | 5.8 |
Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: None). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3229 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3219 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3210 | 5.0 |
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Java Server Faces). The supported version that is affected is 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network acces
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3177 | 5.8 |
Vulnerability in the Hyperion Common Events component of Oracle Hyperion (subcomponent: User Interface). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3297 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3163 | 6.4 |
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Emergency Response System). The supported version that is affected is 9.0. Easily exploitable vulnerability allows unauthentic
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3142 | 4.0 |
Vulnerability in the Hyperion Essbase Administration Services component of Oracle Hyperion (subcomponent: EAS Console). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows low privileged attacker with network a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3134 | 2.6 |
Vulnerability in the Oracle Agile Product Lifecycle Management for Process component of Oracle Supply Chain Products Suite (subcomponent: User Group Management). The supported version that is affected is 6.2.0.0. Difficult to exploit vulnerability al
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3128 | 5.5 |
Vulnerability in the Oracle Hospitality Reporting and Analytics component of Oracle Food and Beverage Applications. The supported version that is affected is 9.0. Easily exploitable vulnerability allows low privileged attacker having Report privilege
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3281 | 5.8 |
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access). Supported versions that are affected are 8.4, 15.1, 15.2, 16.1, 16.2, 17.7 - 17.12 and 18.8.
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3127 | 4.3 |
Vulnerability in the Oracle Demantra Demand Management component of Oracle Supply Chain Products Suite (subcomponent: Product Security). Supported versions that are affected are 7.3.5 and 12.2. Easily exploitable vulnerability allows unauthenticated
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3288 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3175 | 5.8 |
Vulnerability in the Hyperion Common Events component of Oracle Hyperion (subcomponent: User Interface). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3148 | 5.8 |
Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Web Access). Supported versions that are affected are 15.1, 15.2, 16.1, 16.2, 17.1-17.12 and 18.1-18.8. Easily exploitable vulnerability allo
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3138 | 5.8 |
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Attachments / File Upload). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vuln
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3131 | 3.6 |
Vulnerability in the Oracle Hospitality Gift and Loyalty component of Oracle Food and Beverage Applications. The supported version that is affected is 9.0. Easily exploitable vulnerability allows low privileged attacker having Report privilege with l
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3290 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3197 | 7.5 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). The supported version that is affected is 12.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3189 | 5.8 |
Vulnerability in the Oracle Customer Interaction History component of Oracle E-Business Suite (subcomponent: Outcome-Result). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3179 | 6.4 |
Vulnerability in the Oracle Identity Manager component of Oracle Fusion Middleware (subcomponent: Advanced Console). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3059 | 5.8 |
Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: UIF Open UI). Supported versions that are affected are 18.7, 18.8 and 18.9. Easily exploitable vulnerability allows unauthenticated attacker with network access vi
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3266 | 4.4 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Verified Boot). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastruc
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3253 | 6.0 |
Vulnerability in the Oracle Virtual Directory component of Oracle Fusion Middleware (subcomponent: Virtual Directory Manager). Supported versions that are affected are 11.1.1.7.0 and 11.1.1.9.0. Difficult to exploit vulnerability allows low privilege
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3241 | 5.8 |
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access). Supported versions that are affected are 8.4, 15.1, 15.2, 16.1, 16.2, 17.7 - 17.12 and 18.8.
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3225 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3264 | 3.6 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3230 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3215 | 5.8 |
Vulnerability in the Oracle Endeca Information Discovery Integrator component of Oracle Fusion Middleware (subcomponent: Integrator ETL). Supported versions that are affected are 3.1.0 and 3.2.0. Easily exploitable vulnerability allows unauthenticate
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3159 | 3.6 |
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Sender and Receiver). The supported version that is affected is 9.0. Easily exploitable vulnerability allows low privileged at
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3293 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-2911 | 6.8 |
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Java Server Faces). The supported version that is affected is 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network acces
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3294 | 6.0 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3278 | 4.0 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: RBR). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacke
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3271 | 4.7 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel Zones). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastruct
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3233 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3152 | 5.0 |
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Administration). The supported version that is affected is 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access v
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3291 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3208 | 4.0 |
Vulnerability in the Hyperion Data Relationship Management component of Oracle Hyperion (subcomponent: Access and Security). The supported version that is affected is 11.1.2.4.345. Easily exploitable vulnerability allows low privileged attacker with
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3184 | 3.5 |
Vulnerability in the Hyperion BI+ component of Oracle Hyperion (subcomponent: IQR - Foundation Services). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTT
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3166 | 4.0 |
Vulnerability in the Oracle Hospitality Cruise Fleet Management component of Oracle Hospitality Applications (subcomponent: Emergency Response System). The supported version that is affected is 9.0. Easily exploitable vulnerability allows low privile
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3267 | 5.0 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: LFTP). The supported version that is affected is 11.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via FTP to compromi
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3252 | 7.5 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3224 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3205 | 5.8 |
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Workflow). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker wi
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3196 | 5.8 |
Vulnerability in the Oracle Partner Management component of Oracle E-Business Suite (subcomponent: Partner Dashboard). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vuln
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3302 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3222 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3129 | 4.3 |
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Portal). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3272 | 4.9 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel Zones Virtualized NIC Driver). The supported version that is affected is 11.3. Easily exploitable vulnerability allows unauthenticated attacker with log
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3236 | 5.5 |
Vulnerability in the Oracle User Management component of Oracle E-Business Suite (subcomponent: Reports). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows high privile
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3223 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3191 | 7.5 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3167 | 5.0 |
Vulnerability in the Application Management Pack for Oracle E-Business Suite component of Oracle E-Business Suite (subcomponent: User Monitoring). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily expl
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3160 | 4.4 |
Vulnerability in the Oracle Hospitality Cruise Shipboard Property Management System component of Oracle Hospitality Applications (subcomponent: OHC Admin, OHC Management). The supported version that is affected is 8.0. Easily exploitable vulnerabilit
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3299 | 5.8 |
Vulnerability in the Oracle Text component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocol
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3247 | 5.5 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Merge). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attac
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3146 | 5.8 |
Vulnerability in the Oracle iLearning component of Oracle iLearning (subcomponent: Learner Administration). Supported versions that are affected are 6.1 and 6.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3130 | 5.5 |
Vulnerability in the PeopleSoft Enterprise Interaction Hub component of Oracle PeopleSoft Products (subcomponent: Application Portal). The supported version that is affected is 9.1.0.0. Easily exploitable vulnerability allows low privileged attacker
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3296 | 4.4 |
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastru
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3270 | 1.2 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3256 | 4.3 |
Vulnerability in the Oracle Email Center component of Oracle E-Business Suite (subcomponent: Message Display). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerabilit
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3248 | 4.3 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). The supported version that is affected is 10.3.6.0. Easily exploitable vulnerability allows unauthenticated attacker with network ac
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3245 | 7.5 |
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated a
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3232 | 5.8 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3172 | 5.0 |
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: RPC). Supported versions that are affected are 10 and 11.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via Portmap v3
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-3147 | 4.3 |
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker w
|
03-10-2019 - 00:03 | 17-10-2018 - 01:31 | |
CVE-2018-17472 | 6.8 |
Incorrect handling of googlechrome:// URL scheme on iOS in Intents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to escape the <iframe> sandbox via a crafted HTML page.
|
03-10-2019 - 00:03 | 14-11-2018 - 15:29 | |
CVE-2018-15758 | 6.8 |
Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or a
|
03-10-2019 - 00:03 | 18-10-2018 - 22:29 | |
CVE-2017-14849 | 5.0 |
Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules.
|
03-10-2019 - 00:03 | 28-09-2017 - 01:29 | |
CVE-2018-9206 | 7.5 |
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
|
11-09-2019 - 19:28 | 11-10-2018 - 15:29 | |
CVE-2018-17466 | 6.8 |
Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
|
05-03-2019 - 15:57 | 14-11-2018 - 15:29 | |
CVE-2018-17470 | 4.3 |
A heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
|
15-01-2019 - 17:46 | 09-01-2019 - 19:29 | |
CVE-2018-17468 | 4.3 |
Incorrect handling of timer information during navigation in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obtain cross origin URLs via a crafted HTML page.
|
19-12-2018 - 20:59 | 14-11-2018 - 15:29 | |
CVE-2018-17465 | 6.8 |
Incorrect implementation of object trimming in V8 in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
|
19-12-2018 - 20:34 | 14-11-2018 - 15:29 | |
CVE-2018-17469 | 6.8 |
Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
|
18-12-2018 - 18:47 | 14-11-2018 - 15:29 | |
CVE-2018-2912 | 5.0 |
Vulnerability in the Oracle GoldenGate component of Oracle GoldenGate (subcomponent: Manager). Supported versions that are affected are 12.1.2.1.0, 12.2.0.2.0 and 12.3.0.1.0. Easily exploitable vulnerability allows unauthenticated attacker with netwo
|
24-10-2018 - 13:27 | 17-10-2018 - 01:31 | |
CVE-2018-2914 | 5.0 |
Vulnerability in the Oracle GoldenGate component of Oracle GoldenGate (subcomponent: Manager). Supported versions that are affected are 12.1.2.1.0, 12.2.0.2.0 and 12.3.0.1.0. Easily exploitable vulnerability allows unauthenticated attacker with netwo
|
24-10-2018 - 13:20 | 17-10-2018 - 01:31 | |
CVE-2006-6034 | 7.5 |
Multiple SQL injection vulnerabilities in SitesOutlet E-commerce Kit-1 PayPal Edition allow remote attackers to execute arbitrary SQL commands via the (1) keyword or (2) cid parameter in (a) catalogue.asp, or the (3) pid parameter in (b) viewDetail.a
|
17-10-2018 - 21:46 | 21-11-2006 - 23:07 | |
CVE-2004-0495 | 7.2 |
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
|
11-10-2017 - 01:29 | 06-08-2004 - 04:00 | |
CVE-2004-0785 | 7.5 |
Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a lon
|
11-10-2017 - 01:29 | 20-10-2004 - 04:00 | |
CVE-2004-0754 | 7.5 |
Integer overflow in Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the size variable in Groupware server messages.
|
11-10-2017 - 01:29 | 20-10-2004 - 04:00 | |
CVE-2004-2720 | 4.3 |
Cross-site scripting (XSS) vulnerability in register.asp in Snitz Forums 2000 3.4.04 and earlier allows remote attackers to inject arbitrary web script or HTML via javascript events in the Email parameter.
|
29-07-2017 - 01:29 | 31-12-2004 - 05:00 | |
CVE-2004-2663 | 7.5 |
The (1) SetDebugging and (2) RunEgatherer methods in IBM Access Support eGatherer ActiveX control 2.0.0.16 allow remote attackers to create files with arbitrary content, as demonstrated by creating a .hta file in a Startup folder.
|
20-07-2017 - 01:29 | 31-12-2004 - 05:00 | |
CVE-2004-2589 | 5.0 |
Gaim before 0.82 allows remote servers to cause a denial of service (application crash) via a long HTTP Content-Length header, which causes Gaim to abort when attempting to allocate memory.
|
11-07-2017 - 01:32 | 31-12-2004 - 05:00 | |
CVE-2004-0708 | 7.5 |
MoinMoin 1.2.1 and earlier allows remote attackers to gain privileges by creating a user with the same name as an existing group that has higher privileges.
|
11-07-2017 - 01:30 | 27-07-2004 - 04:00 | |
CVE-2000-0239 | 5.0 |
Buffer overflow in the MERCUR WebView WebMail server allows remote attackers to cause a denial of service via a long mail_user parameter in the GET request.
|
18-10-2016 - 02:06 | 15-03-2000 - 05:00 |