Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
core rdbms vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2006-5337
Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.0.1.5, 9.2.0.8, 10.1.0.5, and 10.2.0.2 has unknown impact and remote authenticated attack vectors, aka Vuln# DB09.
Oracle Database Server 10.1.0.5
Oracle Database Server 9.2.0.8
Oracle Database Server 10.2.0.2
Oracle Database Server 9.0.1.5
6.4
CVSSv2
CVE-2012-0510
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, and 11.1.0.7 allows remote malicious users to affect integrity and availability via unknown vectors.
Oracle Database Server 10.2.0.4
Oracle Database Server 10.2.0.5
Oracle Database Server 10.2.0.3
Oracle Database Server 11.1.0.7
5
CVSSv2
CVE-2011-2230
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.1 allows remote malicious users to affect availability via unknown vectors.
Oracle Database Server 10.2.0.3
Oracle Database Server 10.2.0.4
Oracle Database Server 10.2.0.5
Oracle Database Server 11.1.0.7
Oracle Database Server 11.2.0.1
Oracle Database Server 10.1.0.5
6.5
CVSSv2
CVE-2014-4236
Unspecified vulnerability in the RDBMS Core component in Oracle Database Server 11.2.0.4 and 12.1.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Database Server 11.2.0.4
Oracle Database Server 12.1.0.1
4
CVSSv2
CVE-2015-0483
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect integrity via unknown vectors.
Oracle Database Server 12.1.0.1
Oracle Database Server 12.1.0.2
Oracle Database Server 11.1.0.7
Oracle Database Server 11.2.0.3
Oracle Database Server 11.2.0.4
7.1
CVSSv2
CVE-2009-0985
Unspecified vulnerability in the Core RDBMS component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users with the IMP_FULL_DATABASE role to affect confidentiality, integrity, and availability.
Oracle Database 10g 10.2.0.4
Oracle Database 11g 11.1.0.6
Oracle Database 10g 10.1.0.5
2.1
CVSSv2
CVE-2012-3146
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote authenticated users to affect integrity via unknown vectors.
Oracle Database Server 10.2.0.3
Oracle Database Server 10.2.0.4
Oracle Database Server 11.2.0.2
Oracle Database Server 11.2.0.3
Oracle Database Server 10.2.0.5
Oracle Database Server 11.1.0.7
4.9
CVSSv2
CVE-2015-0371
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect integrity and availability via unknown vectors.
Oracle Database Server 11.1.0.7
Oracle Database Server 12.1.0.1
Oracle Database Server 11.2.0.4
Oracle Database Server 11.2.0.3
6
CVSSv2
CVE-2015-0468
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, and 12.1.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Database Server 11.2.0.3
Oracle Database Server 12.1.0.1
Oracle Database Server 11.1.0.7
4
CVSSv2
CVE-2014-0377
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality via vectors related to SYS tables.
Oracle Database Server 11.2.0.4
Oracle Database Server 12.1.0.1
Oracle Database Server 11.2.0.3
Oracle Database Server 11.1.0.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »