Oracle Sd Wan Aware
By the Year
In 2022 there have been 0 vulnerabilities in Oracle Sd Wan Aware . Last year Sd Wan Aware had 1 security vulnerability published. Right now, Sd Wan Aware is on track to have less security vulnerabilities in 2022 than it did last year.
It may take a day or so for new Sd Wan Aware vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Oracle Sd Wan Aware Security Vulnerabilities
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality
5.3 - Medium
- October 04, 2021
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Improper Input Validation
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation
8.6 - High
- June 05, 2020
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
Integer Overflow or Wraparound
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite
6.1 - Medium
- April 02, 2020
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
A vulnerability was found in Hibernate-Validator
6.1 - Medium
- November 08, 2019
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.