Multiple vulnerabilities in Oracle Outside In Technology



Risk Medium
Patch available YES
Number of vulnerabilities 21
CVE-ID CVE-2018-3217
CVE-2018-3218
CVE-2018-3219
CVE-2018-3220
CVE-2018-3221
CVE-2018-3302
CVE-2018-3222
CVE-2018-3223
CVE-2018-3224
CVE-2018-3225
CVE-2018-3226
CVE-2018-3227
CVE-2018-3228
CVE-2018-3229
CVE-2018-3230
CVE-2018-3231
CVE-2018-3232
CVE-2018-3233
CVE-2018-3234
CVE-2018-18223
CVE-2018-18224
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Oracle Outside In Technology
Client/Desktop applications / Other client software

Vendor Oracle

Security Bulletin

This security bulletin contains information about 21 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU17590

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3217

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or manipulate data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://www.securityfocus.com/bid/105603


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU17591

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3218

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or manipulate data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU17592

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3219

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or delete data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU17593

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3220

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or delete data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

EUVDB-ID: #VU17594

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3221

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU17595

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3302

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Input validation error

EUVDB-ID: #VU17596

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3222

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Input validation error

EUVDB-ID: #VU17597

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3223

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Input validation error

EUVDB-ID: #VU17598

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3224

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Input validation error

EUVDB-ID: #VU17599

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3225

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Input validation error

EUVDB-ID: #VU17600

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3226

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Input validation error

EUVDB-ID: #VU17601

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3227

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Input validation error

EUVDB-ID: #VU17602

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3228

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Input validation error

EUVDB-ID: #VU17603

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3229

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Input validation error

EUVDB-ID: #VU17604

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3230

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Input validation error

EUVDB-ID: #VU17605

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3231

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Input validation error

EUVDB-ID: #VU17606

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3232

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Input validation error

EUVDB-ID: #VU17607

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3233

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Input validation error

EUVDB-ID: #VU17608

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-3234

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Input validation error

EUVDB-ID: #VU17609

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-18223

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters ODA Module component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Input validation error

EUVDB-ID: #VU17611

Risk: Medium

CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2018-18224

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to bypass certain security restrictions.

The vulnerability exists due to unspecified error within the Outside In Filters ODA Module component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Oracle Outside In Technology: 8.5.3 - 8.5.4

CPE2.3 External links

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###