Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,830
With exploit
oracle / oracle8i
You can search for specific versions with
https://synscan.net/product/oracle8i/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2006-0552
High
Feb 4, 2006
== standard_8.1.7.4
== standard_8.0.6
== standard_8.0.6.3
== enterprise_8.1.7.4
CVE-2006-0262
High
Jan 18, 2006
== standard_8.1.7.4
== enterprise_8.1.7.4
CVE-2006-0271
High
Jan 18, 2006
== standard_8.1.7.4
== enterprise_8.1.7.4
CVE-2005-3641
High
Nov 16, 2005
== enterprise_8.0.5.0.0
== enterprise_8.0.6.0.0
== enterprise_8.0.6.0.1
== enterprise_8.1.5.0.0
== enterprise_8.1.5.0.2
== enterprise_8.1.5.1.0
== enterprise_8.1.6.0.0
== enterprise_8.1.6.1.0
== enterprise_8.1.7.0.0
== enterprise_8.1.7.1.0
== enterprise_8.1.7.4
== standard_8.0.6
== standard_8.0.6.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7.0.0
== standard_8.1.7.1
== standard_8.1.7.4
CVE-2004-0638
High
Dec 31, 2004
== standard_8.1.7.4
== enterprise_8.1.7.4
CVE-2004-0637
Medium
Sep 2, 2004
== standard_8.1.7_.4
== enterprise_8.1.7_.4
CVE-2004-1362
High
Aug 4, 2004
== enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2004-1364
High
Aug 4, 2004
== enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2004-1365
Low
Aug 4, 2004
== enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2004-1366
Low
Aug 4, 2004
== enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
‹
›
‹
1
2
3
4
5
›