cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-21216,https://securityvulnerability.io/vulnerability/CVE-2024-21216,Oracle WebLogic Server Vulnerability: Unauthenticated Takeover Possible,"An unauthenticated vulnerability exists in Oracle WebLogic Server, a crucial component of Oracle Fusion Middleware, affecting specific versions (12.2.1.4.0 and 14.1.1.0.0). This vulnerability allows an attacker with network access, through protocols like T3 and IIOP, to compromise the server without prior authentication. Successful exploitation can lead to unauthorized access and potential complete takeover of the WebLogic Server, posing significant risks to confidentiality, integrity, and availability. Organizations using the affected versions are advised to apply necessary patches and implement security measures to mitigate potential threats.",Oracle,Oracle Weblogic Server,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,true,false,,2024-10-15T19:52:43.497Z,3570 CVE-2024-21111,https://securityvulnerability.io/vulnerability/CVE-2024-21111,Oracle VM VirtualBox Vulnerability Allows Low Privileged Attackers to Compromise Virtual Machine,"A security vulnerability has been identified in the Oracle VM VirtualBox component of Oracle Virtualization that affects versions prior to 7.0.16. This flaw allows an attacker with low privileges to access the infrastructure where Oracle VM VirtualBox operates, potentially leading to a full compromise of the software. The vulnerability specifically impacts Windows host environments, enabling attackers to gain undue control over Oracle VM VirtualBox, which could lead to significant security breaches affecting the confidentiality, integrity, and availability of the affected systems.",Oracle,Vm Virtualbox,7.8,HIGH,0.0004299999854993075,false,,true,true,true,2024-04-23T14:31:35.000Z,true,true,false,,2024-04-16T22:15:00.000Z,4303