Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fusion middleware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-2493
Unspecified vulnerability in the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.2.4.0, and 12.1.2.0.0 allows remote malicious users to affect confidentiality and availability via vectors related to ADF Faces.
Oracle Fusion Middleware 11.1.1.7.0
Oracle Fusion Middleware 12.1.2.0.0
Oracle Fusion Middleware 11.1.2.4.0
NA
CVE-2015-4808
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via vectors related to Outside In Filters, a different vulnerability than CVE-2015-6013, CVE-2015-6014, CVE-2015-6...
Oracle Fusion Middleware 8.5.0
Oracle Fusion Middleware 8.5.2
Oracle Fusion Middleware 8.5.1
NA
CVE-2015-4809
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via vectors related to Outside In PDF Export SDK, a different vulnerability than CVE-2015-4811.
Oracle Fusion Middleware 8.5.0
Oracle Fusion Middleware 8.5.2
Oracle Fusion Middleware 8.5.1
NA
CVE-2015-4832
Unspecified vulnerability in the Oracle Identity Manager component in Oracle Fusion Middleware 11.1.1.7, 11.1.2.2, and 11.1.2.3 allows remote malicious users to affect integrity via vectors related to OIM Legacy UI.
Oracle Fusion Middleware 11.1.1.7
Oracle Fusion Middleware 11.1.2.2
Oracle Fusion Middleware 11.1.2.3
NA
CVE-2015-4877
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4878.
Oracle Fusion Middleware 8.5.0
Oracle Fusion Middleware 8.5.1
Oracle Fusion Middleware 8.5.2
1 EDB exploit
NA
CVE-2015-4878
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4877.
Oracle Fusion Middleware 8.5.0
Oracle Fusion Middleware 8.5.1
Oracle Fusion Middleware 8.5.2
1 EDB exploit
NA
CVE-2015-0386
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 allows remote malicious users to affect availability via unknown vectors related to Web Listener, a different vulnerability than CVE-2013-0338, CVE-2013-28...
Oracle Fusion Middleware 11.1.1.7.0
Oracle Fusion Middleware 12.1.2.0.0
Oracle Fusion Middleware 12.1.3.0.0
NA
CVE-2010-2370
Unspecified vulnerability in the Oracle Business Process Management component in Oracle Fusion Middleware 5.7 MP3, 6.0 MP5, and 10.3 MP2 allows remote malicious users to affect integrity, related to BPM.
Oracle Fusion Middleware 5.7
Oracle Fusion Middleware 6.0
Oracle Fusion Middleware 10.3
1 EDB exploit
NA
CVE-2015-0449
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.1.0, and 12.1.2.0 allows remote malicious users to affect integrity via unknown vectors related to Console.
Oracle Fusion Middleware 10.3.6
Oracle Fusion Middleware 12.1.2.0.0
Oracle Fusion Middleware 12.1.1
NA
CVE-2015-0493
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.1, 8.5.0, and 8.5.1 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-0474.
Oracle Fusion Middleware 8.4.1
Oracle Fusion Middleware 8.5.0
Oracle Fusion Middleware 8.5.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36954
CVE-2024-36933
CVE-2024-24919
CVE-2024-36923
CVE-2024-2961
CVE-2024-36925
bypass
encryption
command injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »