Known Vulnerabilities for Communications Cloud Native Core Network Function Cloud Native Environment by Oracle

Listed below are 10 of the newest known vulnerabilities associated with "Communications Cloud Native Core Network Function Cloud Native Environment" by "Oracle".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-24407 In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE stat... 8.8 - HIGH 2022-02-24 2022-11-07
CVE-2022-23308 valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes. 7.5 - HIGH 2022-02-26 2022-11-02
CVE-2022-23219 The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies i... 9.8 - CRITICAL 2022-01-14 2022-11-08
CVE-2022-22965 A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data bindin... 9.8 - CRITICAL 2022-04-01 2023-02-09
CVE-2022-22963 In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possibl... 9.8 - CRITICAL 2022-04-01 2022-07-28
CVE-2022-22947 In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the... 10 - CRITICAL 2022-03-03 2022-10-28
CVE-2021-3518 There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an a... 8.8 - HIGH 2021-05-18 2022-10-05
CVE-2021-3517 There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to sup... 8.6 - HIGH 2021-05-19 2022-10-05
CVE-2021-3448 A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, ... 4 - MEDIUM 2021-04-08 2022-10-27
CVE-2021-3177 Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution ... 9.8 - CRITICAL 2021-01-19 2023-05-24

Popular searches for Communications Cloud Native Core Network Function Cloud Native Environment

Functions as a service (FaaS) for developers

www.oracle.com/cloud-native/functions

Functions as a service FaaS for developers Run serverless applications that integrate with Oracle Cloud Infrastructure, Oracle Cloud 1 / - Applications, and third-party services with loud # ! FaaS .

www.oracle.com/cloud/cloud-native/functions Subroutine Oracle Cloud Application software Cloud computing Programmer Software as a service Function as a service Serverless computing Application programming interface Oracle Corporation Oracle Database Third-party software component Computing platform Software Fn key System resource Server (computing) Database trigger On-premises software Source code

Oracle | Integrated Cloud Applications and Platform Services

www.oracle.com

@ sun.am www.oracle.com/index.html www.oracle.com/index.html cloud.oracle.com/service cloud.oracle.com/mycloud/f?p=service%3Ajava%3A0 www.bigmarker.com/inetpresent/Speed-Innovation-with-performance-gains-of-up-to-42-on-the-most-powerful-HPC-Cloud Cloud computing Oracle Corporation Application software Oracle Cloud Computing platform Oracle Database Customer Programmer Database MySQL Software as a service Free software Enterprise resource planning Software deployment Technical support Stack (abstract data type) Barron's (newspaper) Customer experience Software development Software

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report