Known Vulnerabilities for Instantis Enterprisetrack by Oracle

Listed below are 10 of the newest known vulnerabilities associated with "Instantis Enterprisetrack" by "Oracle".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-33503 An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority comp... 7.5 - HIGH 2021-06-29 2023-08-24
CVE-2021-33037 Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding ... 5.3 - MEDIUM 2021-07-12 2022-10-27
CVE-2021-31618 Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as c... 7.5 - HIGH 2021-06-15 2021-12-10
CVE-2021-30641 Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF' 5.3 - MEDIUM 2021-06-10 2021-12-02
CVE-2021-26691 In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap ... 9.8 - CRITICAL 2021-06-10 2022-03-25
CVE-2021-26690 Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer... 7.5 - HIGH 2021-06-10 2021-12-01
CVE-2021-25329 The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 o... 7 - HIGH 2021-03-01 2022-10-27
CVE-2021-25122 When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8... 7.5 - HIGH 2021-03-01 2022-10-25
CVE-2021-22222 Infinite loop in DVB-S2-BB dissector in Wireshark 3.4.0 to 3.4.5 allows denial of service via packet injection or crafted cap... 7.5 - HIGH 2021-06-07 2022-04-01
CVE-2021-2351 Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are... 8.3 - HIGH 2021-07-21 2023-08-08

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOracleInstantis Enterprisetrack17.3AllAllAll
ApplicationOracleInstantis Enterprisetrack17.2AllAllAll
ApplicationOracleInstantis Enterprisetrack17.1AllAllAll

Popular searches for Instantis Enterprisetrack

Construction and Engineering - Project Management Products | Oracle

www.oracle.com/industries/construction-engineering/products

G CConstruction and Engineering - Project Management Products | Oracle Discover how construction and engineering companies can leverage the cloud to quickly, easily, and inexpensively manage an end-to-end project controls platform that enables the collaborative workflows and communication needed to improve productivity and margins in project management efficiency.

www.oracle.com/industries/construction-engineering/products.html www.instantis.com www.oracle.com/applications/primavera/solutions/products.html www.oracle.com/industries/construction-engineering/primavera-products www.oracle.com/us/products/applications/primavera/instantis-enterprisetrack/overview www.oracle.com/applications/primavera/products/enterprisetrack www.oracle.com/applications/primavera/products/risk-analysis.html www.oracle.com/corporate/acquisitions/instantis www.oracle.com/industries/construction-engineering/textura-products Oracle Corporation Project management Engineering Cloud computing Construction Product (business) Oracle Database Professional services Cost engineering Leverage (finance) Workflow Primavera (software) Productivity Software Computing platform Efficiency Communication End-to-end principle Search algorithm Application software

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report