Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle fusion middleware vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2013-5816
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2 allows remote malicious users to affect availability via unknown vectors related to Metro.
Oracle Fusion Middleware 2.1.1
Oracle Fusion Middleware 3.1.2
Oracle Fusion Middleware 3.0.1
5
CVSSv2
CVE-2013-5869
Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.6.0, 11.1.1.7.0, and 11.1.1.8.0 allows remote malicious users to affect confidentiality via unknown vectors related to Page Service.
Oracle Fusion Middleware 11.1.1.8.0
Oracle Fusion Middleware 11.1.1.7.0
Oracle Fusion Middleware 11.1.1.6.0
4
CVSSv2
CVE-2011-0884
Unspecified vulnerability in the Oracle BPEL Process Manager component in Oracle Fusion Middleware 11.1.1.3.0, 11.1.1.4.0, and 11.1.1.5.0 allows remote authenticated users to affect availability, related to BPEL Console.
Oracle Fusion Middleware 11.1.1.5.0
Oracle Fusion Middleware 11.1.1.3.0
Oracle Fusion Middleware 11.1.1.4.0
1.9
CVSSv2
CVE-2015-4808
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via vectors related to Outside In Filters, a different vulnerability than CVE-2015-6013, CVE-2015-6014, CVE-2015-6...
Oracle Fusion Middleware 8.5.0
Oracle Fusion Middleware 8.5.2
Oracle Fusion Middleware 8.5.1
1.5
CVSSv2
CVE-2015-4811
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via vectors related to Outside In PDF Export SDKutside In PDF Export SDK, a different vulnerability than CVE-2015-...
Oracle Fusion Middleware 8.5.1
Oracle Fusion Middleware 8.5.2
Oracle Fusion Middleware 8.5.0
4
CVSSv2
CVE-2015-4838
Unspecified vulnerability in the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.4.0, 12.1.2.0.0, and 12.1.3.0.0 allows remote authenticated users to affect confidentiality via vectors related to ADF Faces.
Oracle Fusion Middleware 12.1.2.0.0
Oracle Fusion Middleware 12.1.3.0.0
Oracle Fusion Middleware 11.1.2.4.0
1.5
CVSSv2
CVE-2015-4878
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4877.
Oracle Fusion Middleware 8.5.0
Oracle Fusion Middleware 8.5.1
Oracle Fusion Middleware 8.5.2
1 EDB exploit
5
CVSSv2
CVE-2015-4909
Unspecified vulnerability in the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.4.0, 12.1.2.0.0, and 12.1.3.0.0 allows remote malicious users to affect integrity via vectors related to ADF Faces.
Oracle Fusion Middleware 12.1.2.0.0
Oracle Fusion Middleware 12.1.3.0.0
Oracle Fusion Middleware 11.1.2.4.0
4
CVSSv2
CVE-2013-1509
Unspecified vulnerability in the Oracle WebCenter Sites component in Oracle Fusion Middleware 7.6.2, 11.1.1.6.0, and 11.1.1.6.1 allows remote authenticated users to affect integrity via unknown vectors related to WebCenter Sites.
Oracle Fusion Middleware 11.1.1.6.1
Oracle Fusion Middleware 7.6.2
Oracle Fusion Middleware 11.1.1.6.0
1 EDB exploit
5.5
CVSSv2
CVE-2010-3588
Unspecified vulnerability in the Oracle Discoverer component in Oracle Fusion Middleware 10.1.2.3, 11.1.1.2.0, and 11.1.1.3.0 allows remote authenticated users to affect confidentiality and integrity, related to EUL Code & Schema.
Oracle Fusion Middleware 11.1.1.2.0
Oracle Fusion Middleware 11.1.1.3.0
Oracle Fusion Middleware 10.1.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »