Vulnerabilities > Oracle > Database Server > 12.2.0.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-07-18 | CVE-2018-2939 | Unspecified vulnerability in Oracle Database Server Vulnerability in the Core RDBMS component of Oracle Database Server. | 8.4 |
2018-04-26 | CVE-2018-10237 | Allocation of Resources Without Limits or Throttling vulnerability in multiple products Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable. | 5.9 |
2018-04-19 | CVE-2018-2841 | Unspecified vulnerability in Oracle Database Server Vulnerability in the Java VM component of Oracle Database Server. | 8.5 |
2018-02-06 | CVE-2017-15095 | Deserialization of Untrusted Data vulnerability in multiple products A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. | 9.8 |
2018-01-18 | CVE-2018-2680 | Unspecified vulnerability in Oracle Database Server 11.2.0.4/12.1.0.2/12.2.0.1 Vulnerability in the Java VM component of Oracle Database Server. | 8.3 |
2018-01-18 | CVE-2018-2575 | Unspecified vulnerability in Oracle Database Server 11.2.0.4/12.2.0.1 Vulnerability in the Core RDBMS component of Oracle Database Server. | 2.0 |
2018-01-18 | CVE-2017-10282 | Unspecified vulnerability in Oracle Database Server 12.1.0.2/12.2.0.1 Vulnerability in the Core RDBMS component of Oracle Database Server. | 9.1 |
2016-04-08 | CVE-2016-2381 | Improper Input Validation vulnerability in multiple products Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp. | 7.5 |