Vulnerabilities > Oracle > Http Server > 11.1.1.9.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-20 | CVE-2021-35666 | Unspecified vulnerability in Oracle Http Server 11.1.1.9.0 Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module). network oracle | 7.1 |
2021-10-20 | CVE-2021-2480 | Unspecified vulnerability in Oracle Http Server 11.1.1.9.0 Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). network oracle | 4.3 |
2021-04-22 | CVE-2021-2315 | Unspecified vulnerability in Oracle Http Server 11.1.1.9.0/12.2.1.3.0/12.2.1.4.0 Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). network oracle | 5.8 |
2020-12-16 | CVE-2020-5360 | Out-of-bounds Read vulnerability in multiple products Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to a Buffer Under-Read Vulnerability. | 5.0 |
2020-04-15 | CVE-2020-2952 | Unspecified vulnerability in Oracle Http Server 11.1.1.9.0 Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). | 6.4 |
2020-01-15 | CVE-2020-2545 | Unspecified vulnerability in Oracle Http Server 11.1.1.9.0/12.1.3.0.0/12.2.1.3.0 Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module). | 5.0 |
2020-01-15 | CVE-2020-2530 | Unspecified vulnerability in Oracle Http Server 11.1.1.9.0/12.1.3.0.0/12.2.1.3.0 Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). network oracle | 5.8 |
2018-01-18 | CVE-2018-2561 | Unspecified vulnerability in Oracle Http Server Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: Web Listener). | 5.0 |
2013-03-15 | CVE-2013-2566 | Inadequate Encryption Strength vulnerability in multiple products The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. | 4.3 |