![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||||||||||||||||||||||||||
|
![]() |
![]() ![]() All Categories Batch files in the Oracle web listener ows-bin directory allow remote attackers to execute commands via a malformed URL that includes '?&'.Category: WEB-CGI |
IPS Alert Level | ||
![]() |
||
Low |
Medium |
High |
![]() |
![]() |
![]() |
![]() |
![]() |
Home | Products | Applications | Markets | Support | How to Buy | Channel Partners | Company |
![]() |
![]() |
|
![]() |
![]() |
Comprehensive Internet Security ® 2003 SonicWALL, Inc. | Privacy Statement |