Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 21 |
CVE-ID | CVE-2018-3217 CVE-2018-3218 CVE-2018-3219 CVE-2018-3220 CVE-2018-3221 CVE-2018-3302 CVE-2018-3222 CVE-2018-3223 CVE-2018-3224 CVE-2018-3225 CVE-2018-3226 CVE-2018-3227 CVE-2018-3228 CVE-2018-3229 CVE-2018-3230 CVE-2018-3231 CVE-2018-3232 CVE-2018-3233 CVE-2018-3234 CVE-2018-18223 CVE-2018-18224 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Oracle Outside In Technology Client/Desktop applications / Other client software |
Vendor | Oracle |
Security Bulletin
This security bulletin contains information about 21 vulnerabilities.
EUVDB-ID: #VU17590
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3217
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or manipulate data.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://www.securityfocus.com/bid/105603
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17591
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3218
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or manipulate data.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17592
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3219
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or delete data.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17593
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3220
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or delete data.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17594
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3221
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17595
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3302
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17596
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3222
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17597
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3223
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17598
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3224
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17599
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3225
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17600
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3226
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17601
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3227
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17602
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3228
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17603
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3229
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17604
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3230
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17605
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3231
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17606
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3232
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17607
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3233
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17608
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-3234
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17609
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-18223
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters ODA Module component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17611
Risk: Medium
CVSSv4.0: 4.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-18224
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to bypass certain security restrictions.
The vulnerability exists due to unspecified error within the Outside In Filters ODA Module component. A remote attacker can trick the victim into sending a specially crafted request to the affected application and gain access to potentially sensitive information or trigger denial of service conditions.
Install updates from vendor's website.
Vulnerable software versionsOracle Outside In Technology: 8.5.3 - 8.5.4
CPE2.3https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.