Oracle Outside In Technology vulnerabilities
195 known vulnerabilities affecting oracle/outside_in_technology.
Total CVEs
195
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH138MEDIUM51
Vulnerabilities
Page 10 of 10
CVE-2016-3575HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3575 [HIGH] CVE-2016-3575: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-
nvd
CVE-2016-3592HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3592 [HIGH] CVE-2016-3592: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-
nvd
CVE-2016-3594HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3594 [HIGH] CVE-2016-3594: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-
nvd
CVE-2016-3579HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3579 [HIGH] CVE-2016-3579: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3580, CVE-
nvd
CVE-2016-3593HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3593 [HIGH] CVE-2016-3593: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-
nvd
CVE-2016-3596HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3596 [HIGH] CVE-2016-3596: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-
nvd
CVE-2016-3576HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3576 [HIGH] CVE-2016-3576: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-
nvd
CVE-2016-3590HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3590 [HIGH] CVE-2016-3590: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-
nvd
CVE-2016-3574HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-07-21
CVE-2016-3574 [HIGH] CVE-2016-3574: Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0,
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-
nvd
CVE-2016-3455HIGHCVSS 8.6v8.5.0v8.5.1+1 more2016-04-21
CVE-2016-3455 [HIGH] CVE-2016-3455: Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters.
nvd
CVE-2015-6015CRITICALCVSS 10.0v8.5.0v8.5.1+1 more2016-01-22
CVE-2015-6015 [CRITICAL] CVE-2015-6015: Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4808, CVE-2015-6013, CVE-2015-6014, and CVE-2016-0432. NOTE: the previous information is from the Janua
nvd
CVE-2015-6013CRITICALCVSS 10.0v8.5.0v8.5.1+1 more2016-01-22
CVE-2015-6013 [CRITICAL] CVE-2015-6013: Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4808, CVE-2015-6014, CVE-2015-6015, and CVE-2016-0432. NOTE: the previous information is from the Janua
nvd
CVE-2015-6014CRITICALCVSS 10.0v8.5.0v8.5.1+1 more2016-01-22
CVE-2015-6014 [CRITICAL] CVE-2015-6014: Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4808, CVE-2015-6013, CVE-2015-6015, and CVE-2016-0432. NOTE: the previous information is from the Janua
nvd
CVE-2011-4516MEDIUMCVSS 6.8v8.3.5v8.3.72011-12-15
CVE-2011-4516 [MEDIUM] CWE-787 CVE-2011-4516: Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer
Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
nvd
CVE-2011-4517MEDIUMCVSS 6.8v8.3.5v8.3.72011-12-15
CVE-2011-4517 [MEDIUM] CWE-787 CVE-2011-4517: The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data typ
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a
nvd
← Previous10 / 10