Vulnerabilities > Oracle > Http Server > 11.1.1.9.0

DATE CVE VULNERABILITY TITLE RISK
2021-10-20 CVE-2021-35666 Unspecified vulnerability in Oracle Http Server 11.1.1.9.0
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module).
network
oracle
7.1
2021-10-20 CVE-2021-2480 Unspecified vulnerability in Oracle Http Server 11.1.1.9.0
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener).
network
oracle
4.3
2021-04-22 CVE-2021-2315 Unspecified vulnerability in Oracle Http Server 11.1.1.9.0/12.2.1.3.0/12.2.1.4.0
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener).
network
oracle
5.8
2020-12-16 CVE-2020-5360 Out-of-bounds Read vulnerability in multiple products
Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to a Buffer Under-Read Vulnerability.
network
low complexity
dell oracle CWE-125
5.0
2020-04-15 CVE-2020-2952 Unspecified vulnerability in Oracle Http Server 11.1.1.9.0
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener).
network
low complexity
oracle
6.4
2020-01-15 CVE-2020-2545 Unspecified vulnerability in Oracle Http Server 11.1.1.9.0/12.1.3.0.0/12.2.1.3.0
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module).
network
low complexity
oracle
5.0
2020-01-15 CVE-2020-2530 Unspecified vulnerability in Oracle Http Server 11.1.1.9.0/12.1.3.0.0/12.2.1.3.0
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener).
network
oracle
5.8
2018-01-18 CVE-2018-2561 Unspecified vulnerability in Oracle Http Server
Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: Web Listener).
network
low complexity
oracle
5.0
2013-03-15 CVE-2013-2566 Inadequate Encryption Strength vulnerability in multiple products
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
4.3