Known Vulnerabilities for Configuration Manager by Oracle

Listed below are 6 of the newest known vulnerabilities associated with "Configuration Manager" by "Oracle".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-40934 A SQL injection vulnerability in Nagios XI 5.11.1 and below allows authenticated attackers with privileges to manage host esc... Not Provided 2023-09-19 2023-09-19
CVE-2023-38343 An XXE (XML external entity injection) vulnerability exists in the CSEP component of Ivanti Endpoint Manager before 2022 SU4.... Not Provided 2023-09-21 2023-09-21
CVE-2023-35078 Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, through 11.10 allows remote attackers to obtain PII, add an... Not Provided 2023-07-25 2023-07-25
CVE-2023-30367 Multi-Remote Next Generation Connection Manager (mRemoteNG) is free software that enables users to store and manage multi-pro... Not Provided 2023-07-26 2023-07-31
CVE-2023-29505 An issue was discovered in Zoho ManageEngine Network Configuration Manager 12.6.165. The WebSocket endpoint allows Cross-site... Not Provided 2023-08-04 2023-08-10
CVE-2023-27169 Xpand IT Write-back manager v2.3.1 uses a hardcoded salt in license class configuration which leads to the generation of a ha... Not Provided 2023-09-12 2023-09-12
CVE-2023-23842 The SolarWinds Network Configuration Manager was susceptible to the Directory Traversal Vulnerability. This vulnerability all... Not Provided 2023-07-26 2023-09-14
CVE-2023-20254 A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an aut... Not Provided 2023-09-27 2023-09-27
CVE-2023-3899 A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The... Not Provided 2023-08-23 2023-09-05
CVE-2022-4023 The 3DPrint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manage... Not Provided 2023-07-17 2023-07-17

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOracleConfiguration Manager12.1.2.0.6AllAllAll
ApplicationOracleConfiguration Manager12.1.2.0.5AllAllAll
ApplicationOracleConfiguration Manager12.1.2.0.2AllAllAll

Popular searches for Configuration Manager

Oracle Configuration Manager Documentation

www.oracle.com/technetwork/documentation/ocm-092152.html

Oracle Configuration Manager Documentation Your search did not match any results. We suggest you try the following to help find what youre looking for:. Oracle Configuration Manager is used to collect client configuration & information and upload it to the Oracle repository. When client configuration data is uploaded on a regular basis, customer support representatives can analyze this data and provide better service to the customers.

www.oracle.com/technical-resources/documentation/ocm.html Architecture of Windows NT Client (computing) Oracle Corporation Oracle Database Computer configuration Upload Documentation Customer support Data Search algorithm Web search engine Cloud computing Software Software repository Application software Repository (version control) Software documentation Megabyte Zip (file format) Reserved word

Installing Oracle Configuration Manager

docs.oracle.com/cd/E28601_01/doc.1037/e26167/install.htm

Installing Oracle Configuration Manager A ? =This chapter provides detailed instructions about installing Oracle Configuration Manager @ > <. It also describes the procedure to prepare a database for configuration " collections. You can install Oracle Configuration

Architecture of Windows NT Oracle Database Installation (computer programs) Oracle Corporation Proxy server Database Computer configuration User (computing) Command (computing) Command-line interface Parameter (computer programming) Password Instruction set architecture Method (computer programming) Scripting language Computer file Email address Directory (computing) Download Technical support

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report