Vulnerability Database

With exploit

oracle / oracle8i

Title Severity Exploit Date Affected Version
CVE-2004-1367 Low Aug 4, 2004 == enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2004-1368 High Aug 4, 2004 == enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2004-1369 Medium Aug 4, 2004 == enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2004-1370 High Aug 4, 2004 == enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2004-1371 High Aug 4, 2004 == enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== enterprise_8.1.7_.4
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2004-1707 High Jul 30, 2004 == enterprise_8.0.5_.0.0
== enterprise_8.0.6_.0.0
== enterprise_8.0.6_.0.1
== enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== standard_8.0.6
== standard_8.0.6_.3
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2003-0634 High Aug 27, 2003 == enterprise_8.1.5_.0.0
== enterprise_8.1.5_.0.2
== enterprise_8.1.5_.1.0
== enterprise_8.1.6_.0.0
== enterprise_8.1.6_.1.0
== enterprise_8.1.7_.0.0
== enterprise_8.1.7_.1.0
== standard_8.1.5
== standard_8.1.6
== standard_8.1.7
== standard_8.1.7_.0.0
== standard_8.1.7_.1
== standard_8.1.7_.4
CVE-2003-0222 High May 12, 2003 == 8.0x
== 8.0.6
== 8.1.6
== 8.1.5
== 8.1.7
== 8.1.7.1
== 8.1.7.4
== 8.1x
== 8.0.6.3
CVE-2003-0095 High Mar 3, 2003 == 8.1.7.1
== 8.1.7
CVE-2003-0096 High Mar 3, 2003 == 8.1.7.1
== 8.1.7