📦 Enterprise Manager Base Platform
by Oracle
🔍 What is Enterprise Manager Base Platform?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
CVE-2022-23305 is an SQL injection vulnerability in Log4j 1.2.x's JDBCAppender that allows attackers to execute arbitrary SQL queries by injecting malicious strings into application inputs that get lo...
This vulnerability in Oracle Enterprise Manager Base Platform allows a low-privileged attacker with local access to the host to completely compromise the system, potentially affecting other connected ...
This vulnerability in Oracle Enterprise Manager Base Platform's Log Management component allows an unauthenticated attacker with network access via HTTP to potentially compromise the system. Successfu...
This vulnerability in Oracle Enterprise Manager's Policy Framework allows unauthenticated attackers with network access via HTTP to potentially compromise the entire Enterprise Manager Base Platform. ...
An unauthenticated attacker can exploit this vulnerability in Oracle Enterprise Manager Base Platform via HTTP to partially modify or delete data, read restricted information, and cause partial denial...
CVE-2021-4104 is a deserialization vulnerability in Log4j 1.2's JMSAppender that allows remote code execution when attackers can modify Log4j configuration files. This affects systems running Log4j 1....
This vulnerability in Oracle Enterprise Manager's Policy Framework allows authenticated attackers with low privileges to gain complete control over the Enterprise Manager Base Platform via HTTP. Affec...
CVE-2021-36160 is an out-of-bounds read vulnerability in Apache HTTP Server's mod_proxy_uwsgi module. A specially crafted URI path can cause the server to read beyond allocated memory boundaries, lead...
This vulnerability in Oracle Database's Advanced Networking Option allows attackers to bypass network encryption protections and potentially compromise the component. It affects Oracle Database Server...
A use-after-free vulnerability in libxml2 versions before 2.9.11 allows attackers to submit crafted XML files to applications using this library, potentially leading to arbitrary code execution. This ...