Known Vulnerabilities for 10g Reports Server by Oracle

Listed below are 1 of the newest known vulnerabilities associated with the software "10g Reports Server" by "Oracle".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-40500 SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker ... Not Provided 2021-10-12 2021-10-12
CVE-2021-37223 Nagios Enterprises NagiosXI <= 5.8.4 contains a Server-Side Request Forgery (SSRF) vulnerability in schedulereport.php. Any a... Not Provided 2021-10-05 2021-10-05
CVE-2005-0873 Multiple cross-site scripting (XSS) vulnerabilities in test.jsp in Oracle Reports Server 10g (9.0.4.3.3) allow remote attacke... 4.3 - MEDIUM 2005-05-02 2016-10-18

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOracle10g Reports Server-AllAllAll

Popular searches for 10g Reports Server

Oracle | Integrated Cloud Applications and Platform Services

www.oracle.com

@ www.oracle.com/index.html sun.am www.oracle.com/index.html cloud.oracle.com/service cloud.oracle.com/home cloud.oracle.com/mycloud/f?p=service%3Ajava%3A0 Cloud computing Oracle Corporation Application software Oracle Cloud Computing platform Oracle Database Programmer Customer Free software Software as a service Innovation Software development Software deployment Enterprise resource planning Database Stack (abstract data type) Customer experience Software Technical support Cloud database

Oracle Application Server 10g Product Center

www.oracle.com/technetwork/middleware/ias/index.html

Oracle Application Server 10g Product Center Oracle Application Server It provides all the middleware services you need to deploy and manage applications and Web services, deliver personalized applications through enterprise portals and mobile devices, provide real-time business intelligence, integrate applications, and automate business processes.

www.oracle.com/technology/products/ias/index.html www.oracle.com/technetwork/middleware/ias/overview/index.html www.oracle.com/technology/products/ias/toplink/jpa/index.html www.oracle.com/technology/documentation/appserver1012.html www.oracle.com/technetwork/es/middleware/ias/index.html www.oracle.com/technetwork/pt/middleware/ias/index.html www.oracle.com/technetwork/middleware/ias/overview/?ssSourceSiteId=ocomen www.oracle.com/technology/products/ias/hi_av/index.html www.oracle.com/technology/products/ias/toplink/JPA/index.html Oracle Application Server Application software Oracle Corporation Application server Internet Middleware Oracle Database UNIX System V PDF Web service Real-time business intelligence Enterprise portal Mobile device Business process Computing platform Software deployment White paper Product (business) Personalization Software

© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report