SB2018101715 - Multiple vulnerabilities in Oracle Outside In Technology
Published: October 17, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 21 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2018-3217)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or manipulate data.
2) Input validation error (CVE-ID: CVE-2018-3218)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or manipulate data.
3) Input validation error (CVE-ID: CVE-2018-3219)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or delete data.
4) Input validation error (CVE-ID: CVE-2018-3220)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or delete data.
5) Input validation error (CVE-ID: CVE-2018-3221)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
6) Input validation error (CVE-ID: CVE-2018-3302)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
7) Input validation error (CVE-ID: CVE-2018-3222)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
8) Input validation error (CVE-ID: CVE-2018-3223)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
9) Input validation error (CVE-ID: CVE-2018-3224)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
10) Input validation error (CVE-ID: CVE-2018-3225)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
11) Input validation error (CVE-ID: CVE-2018-3226)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
12) Input validation error (CVE-ID: CVE-2018-3227)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
13) Input validation error (CVE-ID: CVE-2018-3228)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
14) Input validation error (CVE-ID: CVE-2018-3229)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
15) Input validation error (CVE-ID: CVE-2018-3230)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
16) Input validation error (CVE-ID: CVE-2018-3231)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
17) Input validation error (CVE-ID: CVE-2018-3232)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
18) Input validation error (CVE-ID: CVE-2018-3233)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
19) Input validation error (CVE-ID: CVE-2018-3234)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
20) Input validation error (CVE-ID: CVE-2018-18223)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters ODA Module component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
21) Input validation error (CVE-ID: CVE-2018-18224)
The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters ODA Module component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Remediation
Install update from vendor's website.