Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle reports 10g vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-2371
Directory traversal vulnerability in Oracle Reports 6.0, 6i, 9i, and 10g allows remote malicious users to overwrite arbitrary files via (1) "..", (2) Windows drive letter (C:), and (3) absolute path sequences in the desname parameter. NOTE: this issue was probably fixed...
Oracle Reports 10g
Oracle Reports 6.0
Oracle Reports 6i
Oracle Reports 9i
4.3
CVSSv2
CVE-2005-0873
Multiple cross-site scripting (XSS) vulnerabilities in test.jsp in Oracle Reports Server 10g (9.0.4.3.3) allow remote malicious users to inject arbitrary web script or HTML via the (1) desname or (2) repprod parameter.
Oracle 10g Reports Server 9.0.4.3.3
1 EDB exploit
6.4
CVSSv2
CVE-2012-3153
Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote malicious users to affect confidentiality and integrity via unknown vectors related to Servlet. NOTE: the previous information is from th...
Oracle Fusion Middleware 11.1.2.0
Oracle Fusion Middleware 11.1.1.4.0
Oracle Fusion Middleware 11.1.1.6.0
1 EDB exploit
1 Github repository
3.5
CVSSv2
CVE-2007-0275
Cross-site scripting (XSS) vulnerability in Oracle Reports Web Cartridge (RWCGI60) in the Workflow Cartridge component, as used in Oracle Database 9.2.0.8, 10.1.0.5, and 10.2.0.3; Application Server 9.0.4.3, 10.1.2.0.2, and 10.1.2.2; Collaboration Suite 10.1.2; and Oracle E-Busin...
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.3
Oracle Application Server 10.1.2.0.2
Oracle Application Server 10.1.2.2
Oracle Database Server 9.2.0.8
Oracle E-business Suite 11.5.10.2
Oracle Application Server 9.0.4.3
Oracle Collaboration Suite 10.1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started