Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Vulnerability Management
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Vulnerability Database
Oracle
Oracle NoSQL Database
19.5.12
Known Vulnerabilities in Oracle NoSQL Database 19.5.12
Show more ↓
24.1.17
23.3.33
23.3.32
23.3.31
23.3.30
23.3.29
23.3.28
23.3.27
23.3.26
23.3.25
23.3.24
23.3.23
23.3.22
23.3.21
23.3.20
23.3.19
23.3.18
23.3.17
23.3.16
23.3.15
23.3.14
23.3.13
23.3.12
23.3.11
23.3.10
23.3.9
23.3.8
23.3.7
23.3.6
23.3.5
23.3.4
23.3.3
23.3.2
23.3.1
23.3.0
23.1.29
23.1.28
23.1.27
23.1.26
23.1.25
23.1.24
23.1.23
23.1.22
23.1.21
23.1.20
23.1.19
23.1.18
23.1.17
23.1.16
23.1.15
23.1.14
23.1.13
23.1.12
23.1.11
23.1.10
23.1.9
23.1.8
23.1.7
23.1.6
23.1.5
23.1.4
23.1.3
23.1.2
23.1.1
23.1.0
22.3.94
22.3.93
22.3.92
22.3.91
22.3.90
22.3.89
22.3.88
22.3.87
22.3.86
22.3.85
22.3.84
22.3.83
22.3.82
22.3.81
22.3.80
22.3.79
22.3.78
22.3.77
22.3.76
22.3.75
22.3.74
22.3.73
22.3.72
22.3.71
22.3.70
22.3.69
22.3.68
22.3.67
22.3.66
22.3.65
22.3.64
22.3.63
22.3.62
22.3.61
22.3.60
22.3.59
22.3.58
22.3.57
22.3.56
22.3.55
22.3.54
22.3.53
22.3.52
22.3.51
22.3.50
22.3.49
22.3.48
22.3.47
22.3.46
22.3.45
22.3.44
22.3.43
22.3.42
22.3.41
22.3.40
22.3.39
22.3.38
22.3.37
22.3.36
22.3.35
22.3.34
22.3.33
22.3.32
22.3.31
22.3.30
22.3.29
22.3.28
22.3.27
22.3.26
22.3.25
22.3.24
22.3.23
22.3.22
22.3.21
22.3.20
22.3.19
22.3.18
22.3.17
22.3.16
22.3.15
22.3.14
22.3.13
22.3.12
22.3.11
22.3.10
22.3.9
22.3.8
22.3.7
22.3.6
22.3.5
22.3.4
22.3.3
22.3.2
22.3.1
22.3.0
21.2.71
21.2.30
21.2.29
21.2.28
21.2.27
21.2.26
21.2.25
21.2.24
21.2.23
21.2.22
21.2.21
21.2.20
21.2.19
21.2.18
21.2.17
21.2.16
21.2.15
21.2.14
21.2.13
21.2.12
21.2.11
21.2.10
21.2.9
21.2.8
21.2.7
21.2.6
21.2.5
21.2.4
21.2.3
21.2.2
21.2.1
21.2.0
21.1.12
20.3.40
20.3.39
20.3.38
20.3.37
20.3.36
20.3.35
20.3.34
20.3.33
20.3.32
20.3.31
20.3.30
20.3.29
20.3.28
20.3.27
20.3.26
20.3.25
20.3.24
20.3.23
20.3.22
20.3.21
20.3.20
20.3.19
20.3.18
20.3.17
20.3.16
20.3.15
20.3.14
20.3.13
20.3.12
20.3.11
20.3.10
20.3.9
20.3.8
20.3.7
20.3.6
20.3.5
20.3.4
20.3.3
20.3.2
20.3.1
20.3.0
20.2.17
20.2.16
20.2.15
20.2.14
20.2.13
20.2.12
20.2.11
20.2.10
20.2.9
20.2.8
20.2.7
20.2.6
20.2.5
20.2.4
20.2.3
20.2.2
20.2.1
20.2.0
20.1.20
20.1.19
20.1.18
20.1.17
20.1.16
20.1.15
20.1.14
20.1.13
20.1.12
20.1.11
20.1.10
20.1.9
20.1.8
20.1.7
20.1.6
20.1.5
20.1.4
20.1.3
20.1.2
20.1.1
20.1.0
19.5.42
19.5.41
19.5.40
19.5.39
19.5.38
19.5.37
19.5.36
19.5.35
19.5.34
19.5.33
19.5.32
19.5.31
19.5.30
19.5.29
19.5.28
19.5.27
19.5.26
19.5.25
19.5.24
19.5.23
19.5.22
19.5.21
19.5.20
19.5.19
19.5.18
19.5.17
19.5.16
19.5.15
19.5.14
19.5.13
19.5.12
19.5.11
19.5.10
19.5.9
19.5.8
19.5.7
19.5.6
19.5.5
19.5.4
19.5.3
19.5.2
19.5.1
19.5.0
19.3.12
19.1.10
19.1.8
18.3.11
18.3.10
18.3.9
18.1.20
18.1.16
18.1.13
12cR2.4.5.12
12cR2.4.4.6
12cR1.4.3.11
12cR1.4.3.10
12cR1.4.2.14
12cR1.4.2.10
12cR1.4.0.9
12cR1.3.5.2
12cR1.3.4.7
12cR1.3.3.4
12cR1.3.2.15
12cR1.3.1.7
12cR1.3.1.5
12cR1.3.0.14
12cR1.3.0.9
12cR1.3.0.5
12cR1.2.1.57
12cR1.2.1.54
12cR1.2.1.25
12cR1.2.1.24
12cR1.2.1.19
12cR1.2.1.8
11gR2.2.0.39
11gR2.2.0.26
11gR2.2.0.23
11gR2.1.2.123
Inadequate encryption strength in Oracle NoSQL Database
18 Jul, 2024
Low
Patched
Public exploit
Resource exhaustion in Oracle NoSQL Database
16 Jan, 2024
Medium
Patched
Deserialization of Untrusted Data in Oracle NoSQL Database
18 Apr, 2023
Medium
Patched