Timesten In-Memory Database
by Oracle
Standard maintenance is sufficient
Timesten In-Memory Database has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
12.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 25 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2017-5645 | 9.8 | 94.0% | — |
| CVE-2016-8610 | 7.5 | 71.1% | — |
| CVE-2016-2381 | 7.5 | 19.5% | — |
| CVE-2021-2351 | 8.3 | 3.1% | — |
| CVE-2018-11054 | 7.5 | 2.4% | — |
| CVE-2018-11056 | 6.5 | 2.0% | — |
| CVE-2019-10219 | 6.1 | 1.7% | — |
| CVE-2018-11058 | 9.8 | 1.6% | — |
| CVE-2018-15769 | 7.5 | 1.5% | — |
| CVE-2020-11979 | 7.5 | 1.1% | — |
| CVE-2021-34558 | 6.5 | 0.9% | — |
| CVE-2018-1288 | 5.4 | 0.7% | — |
| CVE-2019-1010239 | 7.5 | 0.7% | — |
| CVE-2019-11835 | 9.8 | 0.6% | — |
| CVE-2018-11057 | 5.9 | 0.6% | — |
| CVE-2019-11834 | 9.8 | 0.6% | — |
| CVE-2020-7712 | 7.2 | 0.5% | — |
| CVE-2021-29923 | 7.5 | 0.3% | — |
| CVE-2021-36221 | 5.9 | 0.2% | — |
| CVE-2019-0201 | 5.9 | 0.2% | — |
8
/ 100
low-risk
Active Threat
8/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.