Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle outside in technology 8.3.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-1766
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1767, CVE...
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.3.5.0
NA
CVE-2012-1767
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5
Oracle Fusion Middleware 8.3.7
NA
CVE-2012-1771
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1772
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1773
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3106
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3107
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3108
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3110
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1769
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »