Oracle Communications Operations Monitor vulnerabilities

45 known vulnerabilities affecting oracle/communications_operations_monitor.

Total CVEs
45
CISA KEV
1
actively exploited
Public exploits
5
Exploited in wild
2
Severity breakdown
CRITICAL7HIGH19MEDIUM19

Vulnerabilities

Page 1 of 3
CVE-2022-24735HIGHCVSS 7.8v4.3v4.4+1 more2022-04-27
CVE-2022-24735 [LOW] CWE-94 CVE-2022-24735: Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script exe Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. The Lua script execution environment in Redis provides some measures
nvd
CVE-2022-24736MEDIUMCVSS 5.5v4.3v4.4+1 more2022-04-27
CVE-2022-24736 [LOW] CWE-476 CVE-2022-24736: Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem wi
nvd
CVE-2022-21395HIGHCVSS 7.2v3.4v4.2+3 more2022-01-19
CVE-2022-21395 [HIGH] CVE-2022-21395: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attac
nvd
CVE-2022-21397MEDIUMCVSS 5.4v3.4v4.2+3 more2022-01-19
CVE-2022-21397 [MEDIUM] CVE-2022-21397: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful atta
nvd
CVE-2022-21401MEDIUMCVSS 6.6v3.4v4.2+3 more2022-01-19
CVE-2022-21401 [MEDIUM] CVE-2022-21401: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. While the vuln
nvd
CVE-2022-21399MEDIUMCVSS 6.6v3.4v4.2+3 more2022-01-19
CVE-2022-21399 [MEDIUM] CVE-2022-21399: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. While the vuln
nvd
CVE-2022-21246MEDIUMCVSS 5.4v3.4v4.2+3 more2022-01-19
CVE-2022-21246 [MEDIUM] CVE-2022-21246: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful atta
nvd
CVE-2022-21402MEDIUMCVSS 4.8v3.4v4.2+3 more2022-01-19
CVE-2022-21402 [MEDIUM] CVE-2022-21402: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful att
nvd
CVE-2022-21400MEDIUMCVSS 5.4v3.4v4.2+3 more2022-01-19
CVE-2022-21400 [MEDIUM] CVE-2022-21400: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful atta
nvd
CVE-2022-21396MEDIUMCVSS 5.4v3.4v4.2+3 more2022-01-19
CVE-2022-21396 [MEDIUM] CVE-2022-21396: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful atta
nvd
CVE-2022-21398MEDIUMCVSS 5.4v3.4v4.2+3 more2022-01-19
CVE-2022-21398 [MEDIUM] CVE-2022-21398: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful atta
nvd
CVE-2022-21403MEDIUMCVSS 6.6v3.4v4.2+3 more2022-01-19
CVE-2022-21403 [MEDIUM] CVE-2022-21403: Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (comp Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. While the vuln
nvd
CVE-2021-44790CRITICALCVSS 9.8PoCv4.3v4.4+1 more2021-12-20
CVE-2021-44790 [CRITICAL] CWE-787 CVE-2021-44790: A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:pars A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
nvd
CVE-2021-44224HIGHCVSS 8.2v4.0v4.3+2 more2021-12-20
CVE-2021-44224 [HIGH] CWE-476 CVE-2021-44224: A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to
nvd
CVE-2021-41182MEDIUMCVSS 6.1v4.3v4.4+1 more2021-10-26
CVE-2021-41182 [MEDIUM] CWE-79 CVE-2021-41182: jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the valu jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not acc
nvd
CVE-2021-41183MEDIUMCVSS 6.1v4.3v4.4+1 more2021-10-26
CVE-2021-41183 [MEDIUM] CWE-79 CVE-2021-41183: jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the valu jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is
nvd
CVE-2021-41184MEDIUMCVSS 6.1v4.3v4.4+1 more2021-10-26
CVE-2021-41184 [MEDIUM] CWE-79 CVE-2021-41184: jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the valu jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the val
nvd
CVE-2021-32762HIGHCVSS 8.8v4.3v4.4+1 more2021-10-04
CVE-2021-32762 [HIGH] CWE-190 CVE-2021-32762: Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool a Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before callin
nvd
CVE-2021-32628HIGHCVSS 7.5v4.3v4.4+1 more2021-10-04
CVE-2021-32628 [HIGH] CWE-190 CVE-2021-32628: Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the zi Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-
nvd
CVE-2021-32627HIGHCVSS 7.5v4.3v4.4+1 more2021-10-04
CVE-2021-32627 [HIGH] CWE-190 CVE-2021-32627: Redis is an open source, in-memory database that persists on disk. In affected versions an integer o Redis is an open source, in-memory database that persists on disk. In affected versions an integer overflow bug in Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default proto-max-bulk-len and client-query-buffer-limit configuration parameters to very large values a
nvd