Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle database 9i 9.2.0.8dv vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-1019
Unspecified vulnerability in the Network Authentication component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Database Server 9.2.0.8
Oracle Database Server 9.2.0.8dv
Oracle Database Server 10.1.0.5
Oracle Database Server 10.1.0.4
Oracle Database Server 11.1.0.7
1 EDB exploit
NA
CVE-2009-1020
Unspecified vulnerability in the Network Foundation component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Database Server 9.2.0.8
Oracle Database Server 9.2.0.8dv
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.4
Oracle Database Server 11.1.0.7
1 EDB exploit
NA
CVE-2009-1970
Unspecified vulnerability in the Listener component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote malicious users to affect availability via unknown vectors, a different vulnerability than CVE-2009-0991.
Oracle Database Server 11.1.0.7
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.4
Oracle Database Server 9.2.0.8
Oracle Database Server 9.2.0.8dv
1 EDB exploit
NA
CVE-2009-0977
Unspecified vulnerability in the Advanced Queuing component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_AQIN. NOTE: the previous information was obtained from the April 20...
Oracle Database 10g 10.1.0.5
Oracle Database 10g 10.2.0.3
Oracle Database 9i 9.2.0.8
Oracle Database 9i 9.2.0.8dv
NA
CVE-2009-0979
Unspecified vulnerability in the Resource Manager component in Oracle Database 9.2.0.8 and 9.2.0.8DV allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Database 9i 9.2.0.8
Oracle Database 9i 9.2.0.8dv
NA
CVE-2009-0984
Unspecified vulnerability in the Database Vault component in Oracle Database 9.2.0.8DV, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_SYS_SQL.
Oracle Database 9i 9.2.0.8dv
Oracle Database 10g 10.2.0.4
Oracle Database 11g 11.1.0.6
NA
CVE-2009-0991
Unspecified vulnerability in the Listener component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote malicious users to affect availability via unknown vectors, a different vulnerability than CVE-2009-1970.
Oracle Database 9i 9.2.0.8
Oracle Database 9i 9.2.0.8dv
Oracle Database 10g 10.1.0.5
Oracle Database 10g 10.2.0.4
Oracle Database 11g 11.1.0.7
1 EDB exploit
NA
CVE-2008-5436
Unspecified vulnerability in the Oracle OLAP component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.4 allows remote authenticated users to affect integrity and availability via unknown vectors.
Oracle Database 9i 9.2.0.8
Oracle Database 10g 10.1.0.5
Oracle Database 10g 10.2.0.4
NA
CVE-2008-5437
Unspecified vulnerability in the Job Queue component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_IJOB.
Oracle Database 9i 9.2.0.8
Oracle Database 10g 10.1.0.5
Oracle Database 10g 10.2.0.4
Oracle Database 11i 11.1.0.6
NA
CVE-2008-3974
Unspecified vulnerability in the Oracle OLAP component in Oracle Database 9.0.2.8 and 9.2.0.8DV allows remote authenticated users to affect availability, related to SYS.OLAPIMPL_T.
Oracle Database 9i 9.2.0.8
Oracle Database 9i 9.0.2.8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »