Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle fusion middleware 8.3.5.0 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2012-0554
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote malicious users to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-201...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
668
VMScore
CVE-2012-0555
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote malicious users to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-201...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
392
VMScore
CVE-2011-2264
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.2.0 and 8.3.5.0 allows context-dependent malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Outside In Filters. NOTE: the pre...
Oracle Fusion Middleware 8.3.2.0
Oracle Fusion Middleware 8.3.5.0
169
VMScore
CVE-2011-2267
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.2.0 and 8.3.5.0 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters.
Oracle Fusion Middleware 8.3.2.0
Oracle Fusion Middleware 8.3.5.0
392
VMScore
CVE-2012-0110
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK.
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
668
VMScore
CVE-2012-0556
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote malicious users to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-201...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
668
VMScore
CVE-2012-0557
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote malicious users to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-201...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
215
VMScore
CVE-2012-1769
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
1 EDB exploit
215
VMScore
CVE-2012-1770
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.3.5.0
1 EDB exploit
187
VMScore
CVE-2012-1771
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »