Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle core rdbms 12.2.0.1 vulnerabilities and exploits
(subscribe to this query)
2.7
CVSSv3
CVE-2020-14742
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having SYSDBA level account privilege with network access via ...
Oracle Core Rdbms 11.2.0.4
Oracle Core Rdbms 12.1.0.2
Oracle Core Rdbms 12.2.0.1
Oracle Core Rdbms 18c
Oracle Core Rdbms 19c
2.4
CVSSv3
CVE-2020-2516
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Materialized View, Create Table privilege with network acc...
Oracle Database Server 12.1.0.2
Oracle Database Server 12.1.0.1
Oracle Database Server 18c
Oracle Database Server 19c
2.3
CVSSv3
CVE-2019-2940
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows high privileged attacker having Create Session privilege with logon to the infrastructure where Core R...
Oracle Database Server 12.1.0.2
Oracle Database Server 18c
Oracle Database Server 12.2.0.1
2
CVSSv3
CVE-2018-2575
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, and 12.2.0.1. Difficult to exploit vulnerability allows high privileged attacker having Local Logon privilege with network access via multiple protoco...
Oracle Database Server 12.2.0.1
Oracle Database Server 11.2.0.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4