Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-2612
Unspecified vulnerability in the Hyperion BI Plus component in Oracle Application Server 8.3.2.4, 8.5.0.3, 9.2.0.3, 9.2.1.0, and 9.3.1.0 has unknown impact and remote attack vectors.
Oracle Hyperion Bi Plus Component
Oracle Oracle Application Server 8.3.2.4
Oracle Oracle Application Server 8.5.0.3
Oracle Oracle Application Server 9.3.1.0
Oracle Oracle Application Server 9.2.0.3
Oracle Oracle Application Server 9.2.1.0
NA
CVE-2002-0567
Oracle 8i and 9i with PL/SQL package for External Procedures (EXTPROC) allows remote malicious users to bypass authentication and execute arbitrary functions by using the TNS Listener to directly connect to the EXTPROC process.
Oracle Database Server 8.0.3
Oracle Database Server 8.0.4
Oracle Oracle8i 8.1.5
Oracle Oracle8i 8.1.6
Oracle Oracle8i Enterprise 8.1.5.0.2
Oracle Oracle8i Enterprise 8.1.5.1.0
Oracle Database Server 8.0.5
Oracle Database Server 8.0.5.1
Oracle Oracle8i 8.1.7
Oracle Oracle8i 8.1.7.1
Oracle Oracle8i Enterprise 8.1.6.0.0
Oracle Oracle8i Enterprise 8.1.6.1.0
Oracle Database Server 8.0.1
Oracle Database Server 8.0.2
Oracle Database Server 8.1.6
Oracle Database Server 8.1.7
Oracle Database Server 8.1.7.0.0
Oracle Oracle8i Enterprise 8.0.6.0.1
Oracle Oracle8i Enterprise 8.1.5.0.0
Oracle Oracle9i 9.0
Oracle Oracle9i 9.0.1
Oracle Database Server 8.0.6
NA
CVE-2005-0709
MySQL 4.0.23 and previous versions, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
Oracle Mysql 4.0.11
Oracle Mysql 4.0.20
Oracle Mysql 4.0.21
Oracle Mysql 4.0.7
Oracle Mysql 4.0.8
Oracle Mysql 4.1.2
Mysql Mysql 4.1.3
Oracle Mysql 4.0.1
Oracle Mysql 4.0.10
Oracle Mysql 4.0.18
Oracle Mysql 4.0.2
Oracle Mysql 4.0.5a
Oracle Mysql 4.0.6
Oracle Mysql 4.1.0
Mysql Mysql 4.1.10
Oracle Mysql 4.0.12
Oracle Mysql 4.0.13
Oracle Mysql 4.0.23
Oracle Mysql 4.0.3
Oracle Mysql 4.0.9
Oracle Mysql 4.1.3
Oracle Mysql 4.1.4
1 EDB exploit
NA
CVE-2005-0710
MySQL 4.0.23 and previous versions, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_i...
Oracle Mysql 4.0.1
Oracle Mysql 4.0.10
Oracle Mysql 4.0.2
Oracle Mysql 4.0.20
Oracle Mysql 4.0.6
Oracle Mysql 4.0.7
Oracle Mysql 4.1.0
Mysql Mysql 4.1.10
Oracle Mysql 3.23.49
Oracle Mysql 4.0.0
Oracle Mysql 4.0.15
Oracle Mysql 4.0.18
Oracle Mysql 4.0.5
Oracle Mysql 4.0.5a
Oracle Mysql 4.0.9
Mysql Mysql 4.1.0
Oracle Mysql 4.0.11
Oracle Mysql 4.0.21
Oracle Mysql 4.0.23
Oracle Mysql 4.0.8
Oracle Mysql 4.1.2
Mysql Mysql 4.1.3
1 EDB exploit
NA
CVE-2005-0711
MySQL 4.0.23 and previous versions, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.
Oracle Mysql 4.0.0
Oracle Mysql 4.0.1
Oracle Mysql 4.0.15
Oracle Mysql 4.0.18
Oracle Mysql 4.0.5
Oracle Mysql 4.0.5a
Mysql Mysql 4.1.0
Oracle Mysql 4.1.0
Oracle Mysql 3.23.49
Oracle Mysql 4.0.13
Oracle Mysql 4.0.14
Oracle Mysql 4.0.3
Oracle Mysql 4.0.4
Oracle Mysql 4.0.9
Oracle Mysql 4.1.4
Oracle Mysql 4.1.5
Oracle Mysql 4.0.10
Oracle Mysql 4.0.11
Oracle Mysql 4.0.2
Oracle Mysql 4.0.20
Oracle Mysql 4.0.6
Oracle Mysql 4.0.7
1 EDB exploit
NA
CVE-2003-0634
Stack-based buffer overflow in the PL/SQL EXTPROC functionality for Oracle9i Database Release 2 and 1, and Oracle 8i, allows authenticated database users, and arbitrary database users in some cases, to execute arbitrary code via a long library name.
Oracle Oracle8i Enterprise 8.1.5 .1.0
Oracle Oracle8i Enterprise 8.1.6 .0.0
Oracle Oracle8i Standard 8.1.7 .0.0
Oracle Oracle8i Standard 8.1.7 .1
Oracle Oracle8i Standard 8.1.7 .4
Oracle Oracle9i Personal 9.2.0.1
Oracle Oracle9i Personal 9.2.0.2
Oracle Oracle9i Standard 9.2.0.1
Oracle Oracle9i Standard 9.2.0.2
Oracle Oracle8i Enterprise 8.1.7 .1.0
Oracle Oracle8i Standard 8.1.5
Oracle Oracle9i Enterprise 9.0.1
Oracle Oracle9i Enterprise 9.2.0.1
Oracle Oracle9i Standard 9.0.1.2
Oracle Oracle9i Standard 9.0.1.3
Oracle Oracle8i Enterprise 8.1.6 .1.0
Oracle Oracle8i Enterprise 8.1.7 .0.0
Oracle Oracle9i Client 9.2.0.1
Oracle Oracle9i Client 9.2.0.2
Oracle Oracle9i Standard 9.0
Oracle Oracle9i Standard 9.0.1
Oracle Oracle8i Enterprise 8.1.5 .0.0
NA
CVE-2013-5767
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.12 and previous versions allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
Oracle Mysql 5.6.11
Oracle Mysql 5.6.2
Oracle Mysql 5.6.9
Oracle Mysql 5.6.1
Oracle Mysql 5.6.10
Oracle Mysql 5.6.7
Oracle Mysql 5.6.8
Oracle Mysql 5.6.3
Oracle Mysql 5.6.4
Oracle Mysql
Oracle Mysql 5.6.0
Oracle Mysql 5.6.5
Oracle Mysql 5.6.6
NA
CVE-2013-5786
Unspecified vulnerability in Oracle MySQL Server 5.6.12 and previous versions allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-5793.
Oracle Mysql
Oracle Mysql 5.6.0
Oracle Mysql 5.6.5
Oracle Mysql 5.6.6
Oracle Mysql 5.6.1
Oracle Mysql 5.6.10
Oracle Mysql 5.6.7
Oracle Mysql 5.6.8
Oracle Mysql 5.6.11
Oracle Mysql 5.6.2
Oracle Mysql 5.6.9
Oracle Mysql 5.6.3
Oracle Mysql 5.6.4
NA
CVE-2013-5793
Unspecified vulnerability in Oracle MySQL Server 5.6.12 and previous versions allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-5786.
Oracle Mysql 5.6.2
Oracle Mysql 5.6.3
Oracle Mysql 5.6.4
Oracle Mysql 5.6.11
Oracle Mysql
Oracle Mysql 5.6.9
Oracle Mysql 5.6.1
Oracle Mysql 5.6.10
Oracle Mysql 5.6.7
Oracle Mysql 5.6.8
Oracle Mysql 5.6.0
Oracle Mysql 5.6.5
Oracle Mysql 5.6.6
NA
CVE-2013-2380
Unspecified vulnerability in the Oracle JRockit component in Oracle Fusion Middleware R27.7.4 and previous versions and R28.2.6 and previous versions allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: this might be a du...
Oracle Jrockit R27.2
Oracle Jrockit R27.1
Oracle Jrockit R28.1.4
Oracle Fusion Middleware -
Oracle Jrockit
Oracle Jrockit R28.0.0
Oracle Jrockit R28.0.1
Oracle Jrockit R28.0.2
Oracle Jrockit R28.1.0
Oracle Jrockit R27.3.1
Oracle Jrockit R27.3
Oracle Jrockit R28.1.1
Oracle Jrockit R28.1.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27842
CVE-2024-30657
CVE-2024-4534
hardcoded
SSRF
CVE-2024-21683
CVE-2024-5364
file upload
CVE-2024-5371
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »