Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle outside in technology 8.5.4 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-2461
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to c...
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
5
CVSSv2
CVE-2019-2464
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to c...
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
4.3
CVSSv2
CVE-2018-20584
JasPer 2.0.14 allows remote malicious users to cause a denial of service (application hang) via an attempted conversion to the jp2 format.
Jasper Project Jasper 2.0.14
Debian Debian Linux 8.0
Oracle Outside In Technology 8.5.4
5.8
CVSSv2
CVE-2018-18223
Open Design Alliance Drawings SDK 2019Update1 has a vulnerability during the reading of malformed files, allowing malicious users to obtain sensitive information from process memory or cause a crash.
Opendesign Drawings Sdk 2019
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
5.8
CVSSv2
CVE-2018-18224
A vulnerability exists in the file reading procedure in Open Design Alliance Drawings SDK 2019Update1 on non-Windows platforms in which attackers could perform read operations past the end, or before the beginning, of the intended buffer. This can allow malicious users to obtain ...
Opendesign Drawings Sdk 2019
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
5.8
CVSSv2
CVE-2018-3222
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to...
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
5.8
CVSSv2
CVE-2018-3225
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to...
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
5.8
CVSSv2
CVE-2018-3229
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to...
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
5.8
CVSSv2
CVE-2018-3232
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to...
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
5.8
CVSSv2
CVE-2018-3223
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to...
Oracle Outside In Technology 8.5.3
Oracle Outside In Technology 8.5.4
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »