Max CVSS | 9.0 | Min CVSS | 3.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2016-3511 | 6.9 |
Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.
|
13-05-2022 - 14:57 | 21-07-2016 - 10:13 | |
CVE-2016-3503 | 4.4 |
Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
|
13-05-2022 - 14:57 | 21-07-2016 - 10:12 | |
CVE-2016-3452 | 4.3 |
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related
|
27-12-2019 - 16:08 | 21-07-2016 - 10:12 | |
CVE-2008-2291 | 7.5 |
axengine.exe in Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 generates credentials with a fixed salt or without any salt, which makes it easier for remote attackers to guess encrypted domain credentials.
|
09-10-2019 - 22:55 | 18-05-2008 - 14:20 | |
CVE-2016-3614 | 3.5 |
Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Security: Encryption.
|
21-02-2019 - 17:40 | 21-07-2016 - 10:14 | |
CVE-2014-5149 | 4.7 |
Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page a
|
30-10-2018 - 16:27 | 22-08-2014 - 14:55 | |
CVE-2003-1056 | 7.2 |
The ed editor for Sun Solaris 2.6, 7, and 8 allows local users to create or overwrite arbitrary files via a symlink attack on temporary files.
|
30-10-2018 - 16:26 | 11-12-2003 - 05:00 | |
CVE-2016-5464 | 3.5 |
Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, IP2014, IP2015, and IP2016 allows remote authenticated users to affect integrity via vectors related to SWSE Server, a different vulnerability than CVE-
|
01-09-2017 - 01:29 | 21-07-2016 - 10:15 | |
CVE-2016-5445 | 7.5 |
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
|
01-09-2017 - 01:29 | 21-07-2016 - 10:14 | |
CVE-2016-5457 | 9.0 |
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to LUMAIN.
|
01-09-2017 - 01:29 | 21-07-2016 - 10:15 | |
CVE-2016-5446 | 7.5 |
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Infrastructure.
|
01-09-2017 - 01:29 | 21-07-2016 - 10:15 | |
CVE-2016-3519 | 4.3 |
Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect confidentiality and integrity via vectors related to PC / Get Shortcut.
|
01-09-2017 - 01:29 | 21-07-2016 - 10:13 | |
CVE-2016-3555 | 5.8 |
Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect confidentiality and integrity via vectors related to PGC / Excel Plugin.
|
01-09-2017 - 01:29 | 21-07-2016 - 10:13 | |
CVE-2006-3633 | 6.5 |
OSSP shiela 1.1.5 and earlier allows remote authenticated users to execute arbitrary commands on the CVS server via shell metacharacters in a filename that is committed.
|
20-07-2017 - 01:32 | 27-07-2006 - 01:04 | |
CVE-2015-8563 | 6.8 |
Cross-site request forgery (CSRF) vulnerability in the com_templates component in Joomla! 3.2.0 through 3.3.x and 3.4.x before 3.4.6 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
|
17-12-2015 - 17:28 | 16-12-2015 - 21:59 |