Vulnerabilities > Oracle > Outside IN Technology
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-01-20 | CVE-2021-2068 | Unspecified vulnerability in Oracle Outside in Technology 8.5.4/8.5.5 Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). | 8.6 |
2021-01-20 | CVE-2021-2067 | Unspecified vulnerability in Oracle Outside in Technology 8.5.4/8.5.5 Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). | 8.6 |
2021-01-20 | CVE-2021-2066 | Unspecified vulnerability in Oracle Outside in Technology 8.5.4/8.5.5 Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). | 8.6 |
2021-01-05 | CVE-2020-27845 | Out-of-bounds Read vulnerability in multiple products There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. | 5.5 |
2021-01-05 | CVE-2020-27844 | Improper Input Validation vulnerability in multiple products A flaw was found in openjpeg's src/lib/openjp2/t2.c in versions prior to 2.4.0. | 7.8 |
2021-01-05 | CVE-2020-27843 | Out-of-bounds Read vulnerability in multiple products A flaw was found in OpenJPEG in versions prior to 2.4.0. | 5.5 |
2021-01-05 | CVE-2020-27842 | Out-of-bounds Read vulnerability in multiple products There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. | 5.5 |
2021-01-05 | CVE-2020-27841 | Heap-based Buffer Overflow vulnerability in multiple products There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. | 5.5 |
2020-06-29 | CVE-2020-15389 | Use After Free vulnerability in multiple products jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. | 6.5 |
2020-06-27 | CVE-2020-15358 | Out-of-bounds Write vulnerability in multiple products In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation. | 5.5 |