Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle outside in technology 8.3.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-1766
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1767, CVE...
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.3.5.0
NA
CVE-2012-1771
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1769
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
1 EDB exploit
NA
CVE-2012-1770
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.3.5.0
1 EDB exploit
NA
CVE-2012-3106
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3108
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3110
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-3107
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
NA
CVE-2012-1767
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5
Oracle Fusion Middleware 8.3.7
NA
CVE-2012-1772
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE...
Oracle Fusion Middleware 8.3.5.0
Oracle Fusion Middleware 8.3.7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »