Known Vulnerabilities for Communications Services Gatekeeper by Oracle

Listed below are 10 of the newest known vulnerabilities associated with "Communications Services Gatekeeper" by "Oracle".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-34428 For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroy... 3.5 - LOW 2021-06-22 2022-05-12
CVE-2021-28165 In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receivi... 7.5 - HIGH 2021-04-01 2022-07-29
CVE-2021-28163 In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory tha... 2.7 - LOW 2021-04-01 2022-05-12
CVE-2021-23337 Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. 7.2 - HIGH 2021-02-15 2022-09-13
CVE-2021-2351 Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are... 8.3 - HIGH 2021-07-21 2022-10-06
CVE-2020-17521 Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementati... 5.5 - MEDIUM 2020-12-07 2022-07-25
CVE-2020-11023 In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing 6.1 - MEDIUM 2020-04-29 2022-07-25
CVE-2020-11022 In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing... 6.1 - MEDIUM 2020-04-29 2022-07-25
CVE-2020-9488 Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to ... 3.7 - LOW 2020-04-27 2022-05-12
CVE-2020-7226 CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive m... 7.5 - HIGH 2020-01-24 2022-05-12

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOracleCommunications Services Gatekeeper7.0AllAllAll

Popular searches for Communications Services Gatekeeper

Oracle Communications Services Gatekeeper | Oracle

www.oracle.com/industries/communications/services-gatekeeper

Oracle Communications Services Gatekeeper | Oracle Services Gatekeeper Is.

Oracle Corporation Application programming interface Telecommunication Gatekeeper (macOS) Oracle Database API management Service provider Cloud computing Innovation Enterprise software Application software Software Computing platform PDF Search algorithm Web search engine Out of the box (feature) Business Open API Service-level agreement

Oracle Communications Services Gatekeeper Reviews, Competitors and Pricing

www.itcentralstation.com/products/oracle-communications-services-gatekeeper-reviews

N JOracle Communications Services Gatekeeper Reviews, Competitors and Pricing Real user reviews of Oracle Communications Services Gatekeeper Let IT Central Station help you with your research to find the perfect solution for your business.

Telecommunication Oracle Corporation Gatekeeper (macOS) Pricing Oracle Database API management Information technology Solution Business Database Download Cloud computing Application programming interface Business software Emerging technologies User review Software Software AG MuleSoft Gatekeeper

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report