Vulnerabilities > Oracle > Fusion Middleware > 7.4.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-07-18 | CVE-2023-21994 | Unspecified vulnerability in Oracle Fusion Middleware Vulnerability in the Oracle Mobile Security Suite product of Oracle Fusion Middleware (component: Android Mobile Authenticator App). low complexity oracle | 6.5 |
2015-07-16 | CVE-2015-2598 | Remote Security vulnerability in Oracle Business Intelligence Enterprise Edition Unspecified vulnerability in the mobile app in Oracle Business Intelligence Enterprise Edition in Oracle Fusion Middleware before 11.1.1.7.0 (11.6.39) allows remote authenticated users to affect integrity via unknown vectors related to Mobile - iPad. network oracle | 3.5 |
2013-07-17 | CVE-2013-3764 | Remote Code Execution vulnerability in Oracle Fusion Middleware 7.4.0/7.5.1.1 Unspecified vulnerability in the Oracle Endeca Server component in Oracle Fusion Middleware 7.4.0 and 7.5.1.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2013-3763. | 5.5 |
2013-07-17 | CVE-2013-3763 | Remote Code Execution vulnerability in Oracle Fusion Middleware 7.4.0/7.5.1.1 Unspecified vulnerability in the Oracle Endeca Server component in Oracle Fusion Middleware 7.4.0 and 7.5.1.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2013-3764. | 5.5 |
2012-07-17 | CVE-2012-3135 | Unspecified vulnerability in Oracle Fusion Middleware Unspecified vulnerability in the Oracle JRockit component in Oracle Fusion Middleware 28.2.3 and before, and 27.7.2 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | 10.0 |
2012-05-03 | CVE-2012-1695 | Remote Security vulnerability in Oracle JRockit Unspecified vulnerability in the Oracle JRockit component in Oracle Fusion Middleware 28.2.2 and earlier, and JDK/JRE 5 and 6 27.7.1 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | 10.0 |