Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle glassfish server 3.1.2 vulnerabilities and exploits
(subscribe to this query)
7.3
CVSSv3
CVE-2017-3250
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromis...
Oracle Glassfish Server 3.1.2
Oracle Glassfish Server 3.0.1
Oracle Glassfish Server 2.1.1
7.3
CVSSv3
CVE-2017-3249
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via LDAP to compromis...
Oracle Glassfish Server 3.1.2
Oracle Glassfish Server 2.1.1
Oracle Glassfish Server 3.0.1
4.3
CVSSv3
CVE-2017-3247
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Core). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via SMTP to compromise Or...
Oracle Glassfish Server 3.1.2
Oracle Glassfish Server 3.0.1
Oracle Glassfish Server 2.1.1
8.8
CVSSv3
CVE-2016-5519
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to Java Server Faces.
Oracle Glassfish Server 3.0.1
Oracle Glassfish Server 3.1.2
Oracle Glassfish Server 2.1.1
9
CVSSv3
CVE-2016-5528
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protoc...
Oracle Glassfish Server 3.1.2
Oracle Glassfish Server 2.1.1
Oracle Glassfish Server 3.0.1
7.3
CVSSv3
CVE-2017-10391
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Administration). Supported versions that are affected are 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise...
Oracle Glassfish Server 3.0.1
Oracle Glassfish Server 3.1.2
6.3
CVSSv3
CVE-2017-10393
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Web Container). Supported versions that are affected are 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise ...
Oracle Glassfish Server 3.1.2
Oracle Glassfish Server 3.0.1
NA
CVE-2013-1508
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Sun Middleware Products 3.0.1 and 3.1.2 allows remote malicious users to affect integrity via vectors related to REST Interface.
Oracle Glassfish Server 3.1.2
Oracle Glassfish Server 3.0.1
3.3
CVSSv3
CVE-2017-3239
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Administration). Supported versions that are affected are 3.0.1 and 3.1.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Glassfish Server 3.1.2
Oracle Glassfish Server 3.0.1
9.8
CVSSv3
CVE-2016-3607
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 3.0.1 and 3.1.2 allows remote malicious users to affect confidentiality, integrity, and availability via vectors related to Web Container.
Oracle Glassfish Server 3.0.1
Oracle Glassfish Server 3.1.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »