Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle sun glassfish enterprise server 3.1.1 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2011-3559
Unspecified vulnerability in Oracle Communications Server 2.0; GlassFish Enterprise Server 2.1.1, 3.0.1, and 3.1.1; and Sun Java System App Server 8.1 and 8.2 allows remote malicious users to affect availability via unknown vectors related to Web Container.
Oracle Java System Application Server 8.1
Oracle Communications Server 2.0
Oracle Glassfish Server 2.1.1
Oracle Glassfish Server 3.0.1
Oracle Glassfish Server 3.1.1
Oracle Java System Application Server 8.2
6.8
CVSSv2
CVE-2012-0550
Unspecified vulnerability in the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Web Container.
Oracle Glassfish Server 3.1.1
1 EDB exploit
6.4
CVSSv2
CVE-2011-4358
Unspecified vulnerability in Oracle GlassFish Enterprise Server 3.0.1 and 3.1.1 allows remote malicious users to affect confidentiality and integrity, related to JSF.
Oracle Sun Glassfish Enterprise Server 3.0.1
Oracle Sun Glassfish Enterprise Server 3.1.1
5.8
CVSSv2
CVE-2012-0551
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and previous versions and 6 update 32 and previous versions, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote ma...
Oracle Glassfish Server 3.1.1
Sun Jdk 1.6.0
Sun Jre 1.6.0
Oracle Jdk 1.6.0
Oracle Jdk
Oracle Jre 1.6.0
Oracle Jre
Oracle Jre 1.7.0
Oracle Jdk 1.7.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started