Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle fusion middleware 8.3.7.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-3776
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7, 8.4.0, and 8.4.1 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-3...
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.4
Oracle Fusion Middleware 8.4.1
NA
CVE-2013-3781
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7, 8.4.0, and 8.4.1 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-3...
Oracle Fusion Middleware 8.4.1
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.4
NA
CVE-2012-3107
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3110
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1744
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent users to affect availability via unknown vectors related to Outside In Filters.
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.3.5.0
1 EDB exploit
NA
CVE-2012-1766
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1767, CVE...
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.3.5.0
NA
CVE-2012-1771
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2013-0393
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 and 8.4 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-0418.
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.4
NA
CVE-2012-0557
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote malicious users to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-201...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-0554
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote malicious users to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-201...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »