Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle database 10.1.0.5 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv2
CVE-2008-1815
Unspecified vulnerability in the Change Data Capture component in Oracle Database 10.1.0.5, 10.2.0.3, and 11.1.0.6 has unknown impact and remote authenticated attack vectors related to DBMS_CDC_UTILITY, aka DB02. NOTE: the previous information was obtained from the April 2008 CPU...
Oracle Database 10g 10.2.0.3
Oracle Database 11g 11.1.0.6
Oracle Database 10g 10.1.0.5
5.5
CVSSv2
CVE-2009-1973
Unspecified vulnerability in the Virtual Private Database component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote authenticated users to affect confidentiality and integrity, related to VPD policies.
Oracle Database Server 10.2.0.4
Oracle Database Server 11.1.0.7
Oracle Database Server 10.1.0.5
3.5
CVSSv2
CVE-2009-1971
Unspecified vulnerability in the Data Pump component in Oracle Database 10.1.0.5, 10.2.0.3, and 11.1.0.7 allows remote authenticated users to affect integrity via unknown vectors.
Oracle Database Server 10.2.0.3
Oracle Database Server 11.1.0.7
Oracle Database Server 10.1.0.5
10
CVSSv2
CVE-2006-1875
Unspecified vulnerability in Oracle Database Server 9.0.1.5, 9.2.0.7, and 10.1.0.5 has unknown impact and attack vectors in the Oracle Spatial component, aka Vuln# DB11. NOTE: Oracle has not disputed reliable researcher claims that this issue is SQL injection in MDSYS.SDO_LRS_TRI...
Oracle Database Server 9.2.0.7
Oracle Database Server 10.1.0.5
Oracle Database Server 9.0.1.5
7.2
CVSSv2
CVE-2008-1819
Unspecified vulnerability in the Oracle Net Services component in Oracle Database 9.2.0.8, 10.1.0.5, and 10.2.0.3 has unknown impact and local attack vectors, aka DB09.
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.3
Oracle Database 9i 9.2.0.8
3.2
CVSSv2
CVE-2009-3413
Unspecified vulnerability in the Oracle Spatial component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2008-3976 and CVE-2009-3414.
Oracle Database Server 9.2.0.8
Oracle Database Server 10.1.0.5
Oracle Database Server 9.2.0.8dv
Oracle Database Server 10.2.0.3
4
CVSSv2
CVE-2010-0851
Unspecified vulnerability in the XML DB component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 allows remote authenticated users to affect confidentiality via unknown vectors.
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.3
Oracle Database Server 9.2.0.8
Oracle Database Server 9.2.0.8dv
5.5
CVSSv2
CVE-2010-0852
Unspecified vulnerability in the XML DB component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
Oracle Database Server 9.2.0.8
Oracle Database Server 9.2.0.8dv
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.3
8.5
CVSSv2
CVE-2011-2301
Unspecified vulnerability in the Oracle Text component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, and 11.1.0.7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to CTXSYS.DRVDISP.
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.3
Oracle Database Server 10.2.0.4
Oracle Database Server 11.1.0.7
7.5
CVSSv2
CVE-2006-0551
SQL injection vulnerability in the Data Pump Metadata API in Oracle Database 10g and possibly earlier might allow remote malicious users to execute arbitrary SQL commands via unknown vectors. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is be...
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.1
Oracle Database Server 10.1.0.3
Oracle Database Server 10.1.0.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »