Known Vulnerabilities for Api Gateway by Oracle

Listed below are 10 of the newest known vulnerabilities associated with "Api Gateway" by "Oracle".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-21888 Vulnerability in the Primavera Gateway product of Oracle Construction and Engineering (component: WebUI). Supported versions... Not Provided 2023-01-18 2023-01-18
CVE-2022-47767 A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the at... Not Provided 2023-01-26 2023-01-26
CVE-2022-46829 In JetBrains JetBrains Gateway before 2022.3 a client could connect without a valid token if the host consented. Not Provided 2022-12-08 2022-12-08
CVE-2022-45923 An issue was discovered in OpenText Content Suite Platform 22.1 ( The Common Gateway Interface (CGI) program cs... Not Provided 2023-01-18 2023-01-20
CVE-2022-44284 Dinstar FXO Analog VoIP Gateway DAG2000-16O is vulnerable to Cross Site Scripting (XSS). Not Provided 2022-11-28 2022-11-28
CVE-2022-41006 Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GO... Not Provided 2023-01-26 2023-01-26
CVE-2022-41005 Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GO... Not Provided 2023-01-26 2023-01-26
CVE-2022-40765 A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticat... Not Provided 2022-11-22 2022-11-22
CVE-2022-40228 IBM DataPower Gateway through, through, 2018.4.1.0 through 2018.4.1.22, and thro... Not Provided 2022-11-22 2022-11-22
CVE-2022-36023 Hyperledger Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications... 7 - HIGH 2022-08-18 2022-12-13

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOracleApi Gateway11.
ApplicationOracleApi Gateway11.

Popular searches for Api Gateway

Learn about Oracle API Gateway

Learn about Oracle API Gateway Q O MBuild scalable and secure cloud native applications that provide RESTful APIs Application programming interface Oracle Corporation Cloud computing Oracle Database Front and back ends Representational state transfer Oracle Cloud Scalability Subroutine Gateway, Inc. Gateway (telecommunications) Serverless computing Server (computing) Application software Build (developer conference) Search algorithm Service-oriented architecture Mobile app development Software Communication endpoint

API Gateway OAuth 2.0 Authentication Flows

. API Gateway OAuth 2.0 Authentication Flows The Gateway N L J can use the OAuth 2.0 protocol for authentication and authorization. The Gateway Auth 2.0 Authorization Server and supports several OAuth 2.0 flows that cover common Web server, JavaScript, device, installed application, and server-to-server scenarios. The Web server redirects the user to the Gateway Authorization Server to authenticate and authorize the server to access data on their behalf. After obtaining the authorization code, the Web server passes back the authorization code to obtain an access token response.

Authorization Application programming interface OAuth Access token Web server Server (computing) Client (computing) Authentication Hypertext Transfer Protocol User (computing) Application software World Wide Web Lexical analysis Parameter (computer programming) Gateway, Inc. Access control URL redirection JavaScript Computer configuration Inter-server

© 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status