Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fusion middleware vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2013-3781
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7, 8.4.0, and 8.4.1 allows context-dependent malicious users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-3...
Oracle Fusion Middleware 8.4.1
Oracle Fusion Middleware 8.3.7.0
Oracle Fusion Middleware 8.4
5
CVSSv2
CVE-2013-1545
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 10.1.3.5, 11.1.1.5.0, and 11.1.1.6.0 allows remote malicious users to affect availability via unknown vectors related to Web Listener.
Oracle Fusion Middleware 10.1.3.5
Oracle Fusion Middleware 11.1.1.5.0
Oracle Fusion Middleware 11.1.1.6.0
4
CVSSv2
CVE-2015-4838
Unspecified vulnerability in the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.4.0, 12.1.2.0.0, and 12.1.3.0.0 allows remote authenticated users to affect confidentiality via vectors related to ADF Faces.
Oracle Fusion Middleware 12.1.2.0.0
Oracle Fusion Middleware 12.1.3.0.0
Oracle Fusion Middleware 11.1.2.4.0
7.5
CVSSv2
CVE-2013-5785
Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.6, 11.1.1.7, and 11.1.2.1 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Security and Authentication.
Oracle Fusion Middleware 11.1.1.6.0
Oracle Fusion Middleware 11.1.1.7.0
Oracle Fusion Middleware 11.1.2.1.0
5
CVSSv2
CVE-2013-5869
Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.6.0, 11.1.1.7.0, and 11.1.1.8.0 allows remote malicious users to affect confidentiality via unknown vectors related to Page Service.
Oracle Fusion Middleware 11.1.1.8.0
Oracle Fusion Middleware 11.1.1.7.0
Oracle Fusion Middleware 11.1.1.6.0
6.4
CVSSv2
CVE-2014-2493
Unspecified vulnerability in the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.2.4.0, and 12.1.2.0.0 allows remote malicious users to affect confidentiality and availability via vectors related to ADF Faces.
Oracle Fusion Middleware 11.1.1.7.0
Oracle Fusion Middleware 12.1.2.0.0
Oracle Fusion Middleware 11.1.2.4.0
5
CVSSv2
CVE-2011-3531
Unspecified vulnerability in the Oracle Web Services Manager component in Oracle Fusion Middleware 11.1.1.3, 11.1.1.4, and 11.1.1.5 allows remote malicious users to affect availability via unknown vectors related to Web Services Security.
Oracle Fusion Middleware 11.1.1.3.0
Oracle Fusion Middleware 11.1.1.4.0
Oracle Fusion Middleware 11.1.1.5.0
4.3
CVSSv2
CVE-2011-3562
Unspecified vulnerability in the Portal component in Oracle Fusion Middleware 11.1.1.5, 11.1.1.6, and 11.1.2.0 allows remote malicious users to affect integrity via unknown vectors.
Oracle Fusion Middleware 11.1.1.5.0
Oracle Fusion Middleware 11.1.1.6.0
Oracle Fusion Middleware 11.1.2.0
5.5
CVSSv2
CVE-2011-3568
Unspecified vulnerability in the Oracle Web Services Manager component in Oracle Fusion Middleware 11.1.1.3, 11.1.1.4, and 11.1.1.5 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web Services Security.
Oracle Fusion Middleware 11.1.1.5.0
Oracle Fusion Middleware 11.1.1.4.0
Oracle Fusion Middleware 11.1.1.3.0
5
CVSSv2
CVE-2011-3569
Unspecified vulnerability in the Oracle Web Services Manager component in Oracle Fusion Middleware 11.1.1.3, 11.1.1.4, and 11.1.1.5 allows remote malicious users to affect confidentiality via unknown vectors related to Web Services Security.
Oracle Fusion Middleware 11.1.1.4.0
Oracle Fusion Middleware 11.1.1.3.0
Oracle Fusion Middleware 11.1.1.5.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »