Category: CVSS3 - LOW
CVE-2023-21949

Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 19.3-19.19 and 21.3-21.10. Difficult to exploit vulnerability allows una ...

Continue Reading
Nimbus JOSE+JWT vulnerable to padding oracle attack

Nimbus JOSE+JWT before 4.39 proceeds improperly after detection of an invalid HMAC in authenticated AES-CBC decryption, which allows attackers to conduct a padding oracle attack.Read More ...

Continue Reading
CVE-2023-32024

Microsoft Power Apps Spoofing VulnerabilityRead More ...

Continue Reading
CVE-2023-32020

Windows DNS Spoofing VulnerabilityRead More ...

Continue Reading
Information Disclosure

io.ktor is vulnerable to Information Disclosure. The vulnerability exists due to improper masking of credentials inside exception messages, which allows an attack to exfiltrate the JWT token by sendin ...

Continue Reading
CVE-2022-39043

Juiker app stores debug logs which contains sensitive information to mobile external storage. An unauthenticated physical attacker can access these files to acquire partial user information such as pe ...

Continue Reading
CVE-2023-22263

Experience Manager versions 6.5.15.0 (and earlier) are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. A low-privilege authenticated attacker could leverage this vulne ...

Continue Reading
CVE-2023-22257

Experience Manager versions 6.5.15.0 (and earlier) are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. A low-privilege authenticated attacker could leverage this vulne ...

Continue Reading
CVE-2023-22258

Experience Manager versions 6.5.15.0 (and earlier) are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. A low-privilege authenticated attacker could leverage this vulne ...

Continue Reading
CVE-2023-22259

Experience Manager versions 6.5.15.0 (and earlier) are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. A low-privilege authenticated attacker could leverage this vulne ...

Continue Reading
Load more