Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle peoplesoft products 8.50 vulnerabilities and exploits
(subscribe to this query)
2.8
CVSSv2
CVE-2011-3520
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.49, 8.50, and 8.51 allows remote authenticated users to affect integrity via unknown vectors related to Personalization.
Oracle Peoplesoft Enterprise Peopletools 8.50
Oracle Peoplesoft Enterprise Peopletools 8.51
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.49
Oracle Peoplesoft Enterprise Peopletools 8.49
3.5
CVSSv2
CVE-2012-3111
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect integrity, related to TECH, a different vulnerability than CVE-2012-1762.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
3.5
CVSSv2
CVE-2012-3179
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect integrity via unknown vectors related to Tree Manager.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
4
CVSSv2
CVE-2012-3181
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect availability via unknown vectors related to Security.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
2.1
CVSSv2
CVE-2012-3191
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect availability via unknown vectors related to Data Mover.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
4
CVSSv2
CVE-2012-3195
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect confidentiality via unknown vectors related to Portal.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
3.5
CVSSv2
CVE-2012-1733
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect confidentiality via unknown vectors related to CM.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
3.5
CVSSv2
CVE-2012-1762
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect integrity, related to TECH, a different vulnerability than CVE-2012-3111.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
3.5
CVSSv2
CVE-2012-1764
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect integrity, related to MCF.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
3.2
CVSSv2
CVE-2012-0524
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows local users to affect confidentiality and integrity via unknown vectors related to File Processing.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.50
Oracle Peoplesoft Products 8.52
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »