Tag
#oracle
Swiss researchers debunked MEGA's claims that anyone that would be able to take over MEGA's infrastructure would still not have access to your information and files. The post MEGA claims it can’t decrypt your files. But someone’s managed to… appeared first on Malwarebytes Labs.
SAP Focused Run Simple Diagnostics Agent version 1.0 suffers from a directory traversal vulnerability.
SAP Focused Run Simple Diagnostics Agent version 1.0 suffers from an information disclosure vulnerability.
The SAP Fiori launchpad suffers from a cross site scripting vulnerability. Various component versions are affected.
SAP Focused Run Simple Diagnostics Agent version 1.0 suffers from a missing authentication vulnerability.
SAP Focused Run versions 2.00 and 3.00 suffer from a cross site scripting vulnerability.
The GeoAnalytics feature in Qlik Sense April 2020 patch 4 allows SSRF.
Ubuntu Security Notice 5485-1 - It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information.
Vulnerability in the Oracle Cloud Infrastructure product of Oracle Cloud Services. Easily exploitable vulnerability allows high privileged attacker with network access to compromise Oracle Cloud Infrastructure. Successful attacks of this vulnerability can result in unauthorized access to Oracle Cloud Infrastructure accessible data. All affected customers were notified of CVE-2022-21503 by Oracle. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)
JForum v2.8.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via http://target_host:port/jforum-2.8.0/jforum.page, which allows attackers to arbitrarily add admin accounts.