Known Vulnerabilities for Api Gateway by Oracle

Listed below are 8 of the newest known vulnerabilities associated with the software "Api Gateway" by "Oracle".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-41865 HashiCorp Nomad and Nomad Enterprise 1.1.1 through 1.1.5 allowed authenticated users with job submission capabilities to caus... Not Provided 2021-10-07 2021-10-07
CVE-2021-41159 FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients... 5.8 - MEDIUM 2021-10-21 2021-10-21
CVE-2021-40825 nLight ECLYPSE (nECY) system Controllers running software prior to 1.17.21245.754 contain a default key vulnerability. The nE... 5.8 - MEDIUM 2021-09-17 2021-09-17
CVE-2021-38341 The WooCommerce Payment Gateway Per Category WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflec... 6.1 - MEDIUM 2021-09-10 2021-09-10
CVE-2021-37913 The HGiga OAKlouds mobile portal does not filter special characters of the IPv6 Gateway parameter of the network interface ca... 9.8 - CRITICAL 2021-09-15 2021-09-15
CVE-2021-37273 A Denial of Service issue exists in China Telecom Corporation EPON Tianyi Gateway ZXHN F450(EPON ONU) 3.0. Tianyi Gateway is ... 9.8 - CRITICAL 2021-09-28 2021-09-28
CVE-2021-36764 In CODESYS Gateway V3 before, there is a NULL Pointer Dereference. Crafted communication requests may cause a Null ... 9.8 - CRITICAL 2021-08-04 2021-08-04
CVE-2021-34565 In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials. 9.8 - CRITICAL 2021-08-31 2021-08-31
CVE-2021-34564 Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credential... 5.5 - MEDIUM 2021-08-31 2021-08-31
CVE-2021-34563 In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's... 3.3 - LOW 2021-08-31 2021-08-31

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOracleApi Gateway11.
ApplicationOracleApi Gateway11.

Popular searches for Api Gateway

Learn about Oracle API Gateway

Learn about Oracle API Gateway Q O MBuild scalable and secure cloud native applications that provide RESTful APIs Application programming interface Oracle Corporation Cloud computing Oracle Database Front and back ends Representational state transfer Oracle Cloud Scalability Subroutine Gateway, Inc. Gateway (telecommunications) Serverless computing Server (computing) Application software Build (developer conference) Search algorithm Service-oriented architecture Mobile app development Software Communication endpoint

API Gateway OAuth 2.0 Authentication Flows

. API Gateway OAuth 2.0 Authentication Flows The Gateway N L J can use the OAuth 2.0 protocol for authentication and authorization. The Gateway Auth 2.0 Authorization Server and supports several OAuth 2.0 flows that cover common Web server, JavaScript, device, installed application, and server-to-server scenarios. The Web server redirects the user to the Gateway Authorization Server to authenticate and authorize the server to access data on their behalf. After obtaining the authorization code, the Web server passes back the authorization code to obtain an access token response.

Authorization Application programming interface OAuth Access token Web server Server (computing) Client (computing) Authentication Hypertext Transfer Protocol User (computing) Application software World Wide Web Lexical analysis Parameter (computer programming) Gateway, Inc. Access control URL redirection JavaScript Computer configuration Inter-server

© 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status