Communications Eagle Lnp Application Processor Oracle Communications Eagle Lnp Application Processor

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Oracle Communications Eagle Lnp Application Processor.

By the Year

In 2026 there have been 0 vulnerabilities in Oracle Communications Eagle Lnp Application Processor. Communications Eagle Lnp Application Processor did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 9.80
2020 3 8.20

It may take a day or so for new Communications Eagle Lnp Application Processor vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Oracle Communications Eagle Lnp Application Processor Security Vulnerabilities

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107
CVE-2021-21783 9.8 - Critical - March 25, 2021

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

Integer Overflow or Wraparound

regcomp.c in Perl before 5.30.3
CVE-2020-12723 - June 05, 2020

regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.

Perl before 5.30.3 on 32-bit platforms
CVE-2020-10543 8.2 - High - June 05, 2020

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.

Memory Corruption

Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation
CVE-2020-10878 - June 05, 2020

Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18
CVE-2015-0235 - January 28, 2015

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Oracle Communications Eagle Lnp Application Processor or by Oracle? Click the Watch button to subscribe.

Oracle
Vendor

subscribe