Oracle Enterprise Operations Monitor 4.4

CPE Details

Oracle Enterprise Operations Monitor 4.4
4.4
2022-08-18
11h54 +00:00
2022-09-24
01h58 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:oracle:enterprise_operations_monitor:4.4:*:*:*:*:*:*:*

Informations

Vendor

oracle

Product

enterprise_operations_monitor

Version

4.4

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-23218 2022-01-13 23h00 +00:00 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
9.8
Critical
CVE-2022-23219 2022-01-13 23h00 +00:00 The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
9.8
Critical
CVE-2021-43396 2021-11-04 18h52 +00:00 In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.
7.5
High
CVE-2021-38604 2021-08-12 13h43 +00:00 In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.
7.5
High