Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle business intelligence publisher 12.2.1.0.0 vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2016-3473
Unspecified vulnerability in the BI Publisher (formerly XML Publisher) component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, and 12.2.1.0.0 allows remote authenticated users to affect confidentiality via unknown vectors.
Oracle Business Intelligence Publisher 12.2.1.0.0
Oracle Business Intelligence Publisher 11.1.1.9.0
Oracle Business Intelligence Publisher 11.1.1.7.0
1 EDB exploit
4.3
CVSSv2
CVE-2016-3474
Unspecified vulnerability in the BI Publisher (formerly XML Publisher) component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, and 12.2.1.0.0 allows remote malicious users to affect confidentiality via vectors related to Security.
Oracle Business Intelligence Publisher 12.2.1.0.0
Oracle Business Intelligence Publisher 11.1.1.7.0
Oracle Business Intelligence Publisher 11.1.1.9.0
4
CVSSv2
CVE-2016-0614
Unspecified vulnerability in the Oracle BI Publisher component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, and 12.2.1.0.0 allows remote authenticated users to affect confidentiality via unknown vectors.
Oracle Business Intelligence Publisher 12.2.1.0.0
Oracle Business Intelligence Publisher 11.1.1.9.0
Oracle Business Intelligence Publisher 11.1.1.7.0
5
CVSSv2
CVE-2014-3576
The processControlCommand function in broker/TransportConnection.java in Apache ActiveMQ prior to 5.11.0 allows remote malicious users to cause a denial of service (shutdown) via a shutdown command.
Apache Activemq
Oracle Business Intelligence Publisher 12.2.1.0.0
Oracle Fusion Middleware 11.1.1.7.4
Oracle Fusion Middleware 9.0
Oracle Fusion Middleware 12.1.3.0.0
Oracle Fusion Middleware 8.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started