Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle application server 4.0.8.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-2153
Format string vulnerability in the administrative pages of the PL/SQL module for Oracle Application Server 4.0.8 and 4.0.8 2 allows remote malicious users to execute arbitrary code.
Oracle Application Server 4.0.8.2
Oracle Application Server 4.0.8
7.5
CVSSv2
CVE-2001-0419
Buffer overflow in shared library ndwfn4.so for iPlanet Web Server (iWS) 4.1, when used as a web listener for Oracle application server 4.0.8.2, allows remote malicious users to execute arbitrary commands via a long HTTP request that is passed to the application server, such as /...
Oracle Application Server 4.0.8.2
1 EDB exploit
5.5
CVSSv2
CVE-2008-4014
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
Oracle Application Server 1.0
Oracle Application Server 7.0.4.4
Oracle Application Server 10.1.4.0
Oracle Application Server 9.0.2.0.1
Oracle Application Server 1.0.2.2
Oracle Application Server 9.2.0.7
Oracle Application Server 10.1.2.1
Oracle Application Server 10.1.3
Oracle Application Server 10.1.3.1.0
Oracle Application Server 9.0.4
Oracle Application Server 10.2.0.0
Oracle Application Server 1.0.2.0
Oracle Application Server 3.0.7
Oracle Application Server 9.0.4.3
Oracle Application Server 10.1.2
Oracle Application Server 10.1.2.0
Oracle Application Server 10.1.2.3
Oracle Application Server 6.0.8.26 Ps17
Oracle Application Server 9.0.2.0.0
Oracle Application Server 4.0.8.2
Oracle Application Server 11i
Oracle Application Server 10.1.3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started