📦 Database
by Oracle
🔍 What is Database?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
CVE-2020-35169 is an improper input validation vulnerability in Dell BSAFE cryptographic libraries that could allow attackers to execute arbitrary code or cause denial of service. Affected systems inc...
This vulnerability in Oracle Database Enterprise Edition Sharding allows attackers with local logon privileges to compromise the sharding component, potentially leading to complete system takeover. Wh...
CVE-2020-26185 is a buffer over-read vulnerability in Dell BSAFE Micro Edition Suite that could allow attackers to read sensitive information from adjacent memory locations. This affects systems using...
This vulnerability in Oracle Database 19c Enterprise Edition Sharding allows attackers with Create Any Procedure privilege and network access via Oracle Net to compromise the sharding component. Succe...
This vulnerability in Oracle XML DB allows high-privileged attackers with network access via Oracle Net to compromise the XML DB component, potentially leading to complete takeover. It affects Oracle ...
This vulnerability in Apache Tomcat allows HTTP/2 cleartext (h2c) connections to leak request data between users. When processing h2c requests, Tomcat could duplicate headers and limited body content ...