Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle fusion middleware 8.3.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-3110
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1766
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1767, CVE...
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.3.5.0
NA
CVE-2012-1767
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5
Oracle Fusion Middleware 8.3.7
NA
CVE-2012-1771
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1772
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1773
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1770
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.3.5.0
1 EDB exploit
NA
CVE-2012-1769
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
1 EDB exploit
NA
CVE-2012-3106
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3107
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »