Vulnerabilities > Oracle > Database Server
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-10-25 | CVE-2016-5555 | Unspecified vulnerability in Oracle Database Server 11.2.0.4/12.1.0.2 Unspecified vulnerability in the OJVM component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows remote administrators to affect confidentiality, integrity, and availability via unknown vectors. | 9.1 |
2016-10-25 | CVE-2016-5516 | Unspecified vulnerability in Oracle Database Server 12.1.0.2 Unspecified vulnerability in the Kernel PDB component in Oracle Database Server 12.1.0.2 allows local users to affect availability via unknown vectors. | 6.0 |
2016-10-25 | CVE-2016-5505 | Information Exposure vulnerability in Oracle Database Server 11.2.0.4/12.1.0.2 Unspecified vulnerability in the RDBMS Programmable Interface component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows local users to affect confidentiality via unknown vectors. | 5.5 |
2016-10-25 | CVE-2016-5499 | Permissions, Privileges, and Access Controls vulnerability in Oracle Database Server 11.2.0.4/12.1.0.2 Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows local users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2016-5498. | 3.3 |
2016-10-25 | CVE-2016-5498 | Information Exposure vulnerability in Oracle Database Server 11.2.0.4/12.1.0.2 Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows local users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2016-5499. | 3.3 |
2016-10-25 | CVE-2016-3562 | Information Exposure vulnerability in Oracle Database Server 11.2.0.4/12.1.0.2 Unspecified vulnerability in the RDBMS Security and SQL*Plus components in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows remote administrators to affect confidentiality via vectors related to DBA. | 2.4 |
2016-04-08 | CVE-2016-2381 | Improper Input Validation vulnerability in multiple products Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp. | 7.5 |
2004-08-04 | CVE-2004-1363 | Incorrect Calculation of Buffer Size vulnerability in Oracle products Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed. | 9.8 |