Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle database 18c vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2020-2737
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows high privileged attacker having Create Session, Execute Catalog Role privilege with n...
Oracle Database Server 11.2.0.4
Oracle Database Server 12.1.0.2
Oracle Database Server 12.2.0.1
Oracle Database Server 18c
Oracle Database Server 19c
6
CVSSv2
CVE-2020-2969
Vulnerability in the Data Pump component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows high privileged attacker having DBA role account privilege with network access via Ora...
Oracle Database Server 11.2.0.4
Oracle Database Server 12.1.0.2
Oracle Database Server 12.2.0.1
Oracle Database Server 18c
Oracle Database Server 19c
2.1
CVSSv2
CVE-2021-1993
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to comp...
Oracle Database Server 12.1.0.2
Oracle Database Server 12.2.0.1
Oracle Database Server 18c
Oracle Database Server 19c
Oracle Enterprise Manager Ops Center 12.4.0.0
Oracle Hyperion Infrastructure Technology 11.1.2.4
Oracle Zfs Storage Appliance 8.8
4.3
CVSSv2
CVE-2018-1000873
Fasterxml Jackson version prior to 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Modules-Java8 that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very la...
Fasterxml Jackson-modules-java8
Oracle Database Server 12.1.0.2
Oracle Database Server 12.2.0.1
Oracle Database Server 18c
Oracle Database Server 19c
Oracle Clusterware 12.1.0.2.0
Oracle Global Lifecycle Management Opatch
Oracle Nosql Database
Netapp Active Iq Unified Manager
5
CVSSv2
CVE-2020-5359
Dell BSAFE Micro Edition Suite, versions before 4.5, are vulnerable to an Unchecked Return Value Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to modify and corrupt the encrypted data.
Dell Bsafe Micro-edition-suite
Oracle Database 12.1.0.2
Oracle Database 12.2.0.1
Oracle Database 18c
Oracle Database 19c
Oracle Weblogic Server Proxy Plug-in 11.1.1.9.0
Oracle Weblogic Server Proxy Plug-in 12.2.1.3.0
Oracle Weblogic Server Proxy Plug-in 12.2.1.4.0
7.5
CVSSv2
CVE-2020-1953
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this libr...
Apache Commons Configuration 2.3
Apache Commons Configuration 2.4
Apache Commons Configuration 2.5
Apache Commons Configuration 2.6
Apache Commons Configuration 2.2
Oracle Database Server 12.1.0.2
Oracle Database Server 11.2.0.4
Oracle Database Server 12.2.0.1
Oracle Database Server 18c
Oracle Database Server 19c
Oracle Healthcare Foundation 7.2.0
Oracle Healthcare Foundation 7.2.1
Oracle Healthcare Foundation 7.3.0
Oracle Healthcare Foundation 7.1.1
6.5
CVSSv2
CVE-2021-2054
Vulnerability in the RDBMS Sharding component of Oracle Database Server. Supported versions that are affected are 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Any Procedure, Create Any View, Create Any Trigger privilege wit...
Oracle Rdbms Sharding 12.2.0.1
Oracle Rdbms Sharding 18c
Oracle Rdbms Sharding 19c
5
CVSSv2
CVE-2020-5360
Dell BSAFE Micro Edition Suite, versions before 4.5, are vulnerable to a Buffer Under-Read Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability resulting in undefined behaviour, or a crash of the affected systems.
Dell Bsafe Micro-edition-suite
Oracle Database 12.1.0.2
Oracle Database 12.2.0.1
Oracle Database 18c
Oracle Database 19c
Oracle Http Server 11.1.1.9.0
Oracle Http Server 12.1.3.0
Oracle Http Server 12.2.1.4.0
Oracle Security Service 11.1.1.9.0
Oracle Security Service 12.1.3.0
Oracle Security Service 12.2.1.4.0
Oracle Weblogic Server Proxy Plug-in 11.1.1.9.0
Oracle Weblogic Server Proxy Plug-in 12.1.3.0
Oracle Weblogic Server Proxy Plug-in 12.2.1.4.0
5
CVSSv2
CVE-2016-2381
Perl might allow context-dependent malicious users to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
Perl Perl
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Oracle Communications Billing And Revenue Management 7.5
Oracle Configuration Manager
Oracle Configuration Manager 12.1.2.0.6
Oracle Database Server 11.2.0.4
Oracle Database Server 12.1.0.2
Oracle Database Server 12.2.0.1
Oracle Database Server 18c
Oracle Database Server 19c
Oracle Enterprise Manager Base Platform 13.2.0.0.0
Oracle Enterprise Manager Base Platform 13.3.0.0.0
Oracle Timesten In-memory Database
Oracle Solaris 11.3
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
4.3
CVSSv2
CVE-2019-12973
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
Uclouvain Openjpeg 2.3.1
Opensuse Leap 15.0
Opensuse Leap 15.1
Debian Debian Linux 9.0
Oracle Database Server 18c
Oracle Outside In Technology 8.5.4
Oracle Outside In Technology 8.5.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »