Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle peoplesoft enterprise peopletools 8.52 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-0381
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote malicious users to affect integrity via vectors related to PIA Core Technology, a different vulnerability than CVE-2014-0445.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.52
NA
CVE-2014-0445
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote malicious users to affect integrity via vectors related to PIA Core Technology, a different vulnerability than CVE-2014-0381.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.52
NA
CVE-2013-5794
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote malicious users to affect confidentiality via unknown vectors related to Portal, a different vulnerability than CVE-2013-5841.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.52
NA
CVE-2013-5841
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote malicious users to affect confidentiality via unknown vectors related to Portal, a different vulnerability than CVE-2013-5794.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.52
NA
CVE-2013-2404
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote malicious users to affect integrity via unknown vectors related to Portal, a different vulnerability than CVE-2013-3818.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.52
NA
CVE-2013-2408
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote malicious users to affect integrity via vectors related to PIA Core Technology and use of Internet Explorer 6.
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.52
Oracle Peoplesoft Products 8.53
NA
CVE-2013-3818
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote malicious users to affect integrity via unknown vectors related to Portal, a different vulnerability than CVE-2013-2404.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.51
Oracle Peoplesoft Products 8.52
NA
CVE-2014-2437
Unspecified vulnerability in the PeopleSoft Enterprise PT PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote malicious users to affect confidentiality via unknown vectors related to Integration Broker, a different vulnerability than CVE-2014-2447.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.52
NA
CVE-2014-2447
Unspecified vulnerability in the PeopleSoft Enterprise PT PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote malicious users to affect confidentiality via unknown vectors related to Integration Broker, a different vulnerability than CVE-2014-2437.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.52
NA
CVE-2014-0395
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote malicious users to affect confidentiality via unknown vectors related to Updates Environment Mgmt, a different vulnerability than CVE-2014-0394.
Oracle Peoplesoft Products 8.53
Oracle Peoplesoft Products 8.52
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »