Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle application server 4.0.8.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-2153
Format string vulnerability in the administrative pages of the PL/SQL module for Oracle Application Server 4.0.8 and 4.0.8 2 allows remote malicious users to execute arbitrary code.
Oracle Application Server 4.0.8.2
Oracle Application Server 4.0.8
NA
CVE-2001-0419
Buffer overflow in shared library ndwfn4.so for iPlanet Web Server (iWS) 4.1, when used as a web listener for Oracle application server 4.0.8.2, allows remote malicious users to execute arbitrary commands via a long HTTP request that is passed to the application server, such as /...
Oracle Application Server 4.0.8.2
1 EDB exploit
NA
CVE-2008-4014
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Application Server allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
Oracle Application Server 10.1.2.2
Oracle Application Server 10.1.2.0.2
Oracle Application Server 7.0.4.4
Oracle Application Server 9.0.2.1
Oracle Application Server 10.1.3.2.0
Oracle Application Server 10.1.3.1.0
Oracle Application Server 10.1.2.1.0
Oracle Application Server 9.0.2.0.0
Oracle Application Server 1.0.2.2
Oracle Application Server 1.0.2.0
Oracle Application Server 10.1.3.3
Oracle Application Server 9.0.4
Oracle Application Server 11i
Oracle Application Server 10.1.0.3
Oracle Application Server 10.1.2.0.0
Oracle Application Server 9.0.2
Oracle Application Server 3.0.7
Oracle Application Server 9.0.2.3
Oracle Application Server 9.0.4.1
Oracle Application Server 9.0.4.3
Oracle Application Server 9.2.0.7
Oracle Application Server 9.0.2.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started