Vulnerabilities > Oracle > Integrated Lights OUT Manager Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-07-21 | CVE-2016-5446 | Unspecified vulnerability in Oracle Integrated Lights OUT Manager Firmware 3.0/3.1/3.2 Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Infrastructure. | 7.3 |
2016-07-21 | CVE-2016-5445 | Unspecified vulnerability in Oracle Integrated Lights OUT Manager Firmware 3.0/3.1/3.2 Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | 8.3 |
2016-07-21 | CVE-2016-3585 | Unspecified vulnerability in Oracle Integrated Lights OUT Manager Firmware 3.0/3.1/3.2 Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote attackers to affect confidentiality and integrity via vectors related to Emulex. | 7.4 |
2016-07-21 | CVE-2016-3481 | Unspecified vulnerability in Oracle Integrated Lights OUT Manager Firmware 3.0/3.1/3.2 Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote authenticated users to affect availability via vectors related to Web. | 7.7 |
2016-07-21 | CVE-2016-3451 | Unspecified vulnerability in Oracle Integrated Lights OUT Manager Firmware 3.0/3.1/3.2 Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote attackers to affect integrity via vectors related to Web. | 4.7 |
2015-12-06 | CVE-2015-3195 | Information Exposure vulnerability in multiple products The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application. | 5.3 |
2013-03-15 | CVE-2013-2566 | Inadequate Encryption Strength vulnerability in multiple products The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. | 5.9 |