A vulnerability, which was classified as problematic, was found in Undertow. Affected is an unknown function of the component HTTP2 Handler. The manipulation leads to invocation of process using visible sensitive information.
This vulnerability is traded as CVE-2021-3859. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Oracle Enterprise Manager Base Platform 13.4.0.0 and classified as critical. Affected by this issue is some unknown functionality of the component Application Service Level Management. The manipulation leads to deserialization.
This vulnerability is handled as CVE-2021-4104. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Oracle Service Bus 12.2.1.4.0. Affected is an unknown function of the component Web Console Design. The manipulation leads to deserialization.
This vulnerability is traded as CVE-2021-4104. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Oracle Communications Order and Service Management 7.4.0/7.4.1. Affected by this vulnerability is an unknown functionality of the component Security. The manipulation leads to deserialization.
This vulnerability is known as CVE-2021-4104. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Oracle Retail Allocation 14.1.3.2/15.0.3.1/16.0.3/19.0.1. Affected is an unknown function of the component General. The manipulation leads to deserialization.
This vulnerability is traded as CVE-2021-4104. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Oracle Utilities Testing Accelerator 6.0.0.1.1/6.0.0.2.2/6.0.0.3.1 and classified as critical. This vulnerability affects unknown code of the component Tools. The manipulation leads to deserialization.
This vulnerability was named CVE-2021-4104. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Researchers warn that a critical security flaw in ProjectSend open-source file-sharing application may be under active exploitation. VulnCheck researchers warn that ProjectSend vulnerability CVE-2024-11680 (CVSS score: 9.8) appears to have been exploited by attackers in the wild. The vulnerability is an improper authentication issue that impacts ProjectSend versions before r1720. Remote, unauthenticated attackers can exploit this flaw […]