A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 349 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at July 2022 Critical Patch Update: Executive Summary and Analysis.
Please note that since the release of the April 2022 Critical Patch Update, Oracle has released a Security Alert for Oracle E-Business Suite CVE-2022-21500 (May 19, 2022). Customers are strongly advised to apply the July 2022 Critical Patch Update for Oracle E-Business Suite, which includes patches for this Alert as well as additional patches.
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Affected Products and Versions | Patch Availability Document |
---|---|
Autonomous Health Framework | Oracle Autonomous Health Framework |
Big Data Spatial and Graph, versions prior to 23.1 | Database |
Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0 | Enterprise Manager |
Enterprise Manager for MySQL Database | Enterprise Manager |
Enterprise Manager Ops Center, version 12.4.0.0 | Enterprise Manager |
JD Edwards EnterpriseOne Orchestrator, versions 9.2.6.3 and prior | JD Edwards |
JD Edwards EnterpriseOne Tools, versions 9.2.6.3 and prior | JD Edwards |
MySQL Cluster, versions 7.4.36 and prior, 7.5.26 and prior, 7.6.22 and prior, 8.0.29 and prior, and8.0.29 and prior | MySQL |
MySQL Enterprise Monitor, versions 8.0.30 and prior | MySQL |
MySQL Server, versions 5.7.38 and prior, 8.0.29 and prior | MySQL |
MySQL Shell, versions 8.0.28 and prior | MySQL |
MySQL Shell for VS Code, versions 1.1.8 and prior | MySQL |
MySQL Workbench, versions 8.0.29 and prior | MySQL |
Oracle Agile Engineering Data Management, version 6.2.1.0 | Oracle Supply Chain Products |
Oracle Agile PLM, version 9.3.6 | Oracle Supply Chain Products |
Oracle Agile Product Lifecycle Management for Process, versions 6.2.2, 6.2.3 | Oracle Supply Chain Products |
Oracle Application Express, versions prior to 22.1.1 | Database |
Oracle Application Testing Suite, version 13.3.0.1 | Enterprise Manager |
Oracle Autovue for Agile Product Lifecycle Management, version 21.0.2 | Oracle Supply Chain Products |
Oracle Banking Branch, version 14.5 | Contact Support |
Oracle Banking Cash Management, version 14.5 | Contact Support |
Oracle Banking Corporate Lending Process Management, version 14.5 | Contact Support |
Oracle Banking Credit Facilities Process Management, version 14.5 | Contact Support |
Oracle Banking Deposits and Lines of Credit Servicing, version 2.7 | Contact Support |
Oracle Banking Electronic Data Exchange for Corporates, version 14.5 | Contact Support |
Oracle Banking Liquidity Management, versions 14.2, 14.5 | Contact Support |
Oracle Banking Origination, version 14.5 | Contact Support |
Oracle Banking Party Management, version 2.7 | Oracle Banking Platform |
Oracle Banking Platform, versions 2.6.2, 2.9, 2.12 | Oracle Banking Platform |
Oracle Banking Supply Chain Finance, version 14.5 | Contact Support |
Oracle Banking Trade Finance, version 14.5 | Contact Support |
Oracle Banking Trade Finance Process Management, version 14.5 | Contact Support |
Oracle Banking Virtual Account Management, version 14.5 | Contact Support |
Oracle Berkeley DB | Berkeley DB |
Oracle BI Publisher, versions 12.2.1.3.0, 12.2.1.4.0 | Oracle Analytics |
Oracle Blockchain Platform | Oracle Blockchain Platform |
Oracle Business Intelligence Enterprise Edition, version 5.9.0.0.0 | Oracle Analytics |
Oracle Coherence, versions 3.7.1.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | Fusion Middleware |
Oracle Commerce Guided Search, version 11.3.2 | Oracle Commerce |
Oracle Commerce Merchandising, version 11.3.2 | Oracle Commerce |
Oracle Commerce Platform, versions 11.3.0, 11.3.1, 11.3.2 | Oracle Commerce |
Oracle Communications ASAP, version 7.3 | Oracle Communications ASAP |
Oracle Communications Billing and Revenue Management, versions 12.0.0.4.0-12.0.0.6.0 | Oracle Communications Billing and Revenue Management |
Oracle Communications BRM - Elastic Charging Engine, versions prior to 12.0.0.4.6, prior to 12.0.0.5.1 | Oracle Communications BRM - Elastic Charging Engine |
Oracle Communications Cloud Native Core Binding Support Function, versions 22.1.3, 22.2.0 | Oracle Communications Cloud Native Core Binding Support Function |
Oracle Communications Cloud Native Core Console, versions 22.1.2, 22.2.0 | Oracle Communications Cloud Native Core Console |
Oracle Communications Cloud Native Core Network Exposure Function, version 22.1.1 | Oracle Communications Cloud Native Core Network Exposure Function |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment, versions 22.1.0, 22.1.2, 22.2.0 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment |
Oracle Communications Cloud Native Core Network Repository Function, versions 22.1.2, 22.2.0 | Oracle Communications Cloud Native Core Network Repository Function |
Oracle Communications Cloud Native Core Network Slice Selection Function, version 22.1.1 | Oracle Communications Cloud Native Core Network Slice Selection Function |
Oracle Communications Cloud Native Core Policy, versions 22.1.3, 22.2.0 | Oracle Communications Cloud Native Core Policy |
Oracle Communications Cloud Native Core Security Edge Protection Proxy, version 22.1.1 | Oracle Communications Cloud Native Core Security Edge Protection Proxy |
Oracle Communications Cloud Native Core Service Communication Proxy, version 22.2.0 | Oracle Communications Cloud Native Core Service Communication Proxy |
Oracle Communications Cloud Native Core Unified Data Repository, version 22.2.0 | Oracle Communications Cloud Native Core Unified Data Repository |
Oracle Communications Core Session Manager, versions 8.2.5, 8.4.5 | Oracle Communications Core Session Manager |
Oracle Communications Design Studio, version 7.4.2 | Oracle Communications Design Studio |
Oracle Communications Instant Messaging Server, version 10.0.1.5.0 | Oracle Communications Instant Messaging Server |
Oracle Communications IP Service Activator | Oracle Communications IP Service Activator |
Oracle Communications Offline Mediation Controller, versions prior to 12.0.0.4.4, prior to 12.0.0.5.1 | Oracle Communications Offline Mediation Controller |
Oracle Communications Operations Monitor, versions 4.3, 4.4, 5.0 | Oracle Communications Operations Monitor |
Oracle Communications Session Border Controller, versions 8.4, 9.0, 9.1 | Oracle Communications Session Border Controller |
Oracle Communications Unified Inventory Management, versions 7.4.1, 7.4.2, 7.5.0 | Oracle Communications Unified Inventory Management |
Oracle Communications Unified Session Manager, version 8.2.5 | Oracle Communications Unified Session Manager |
Oracle Crystal Ball, versions 11.1.2.0.0-11.1.2.4.900 | Oracle Construction and Engineering Suite |
Oracle Data Integrator | Fusion Middleware |
Oracle Database Server, versions 12.1.0.2, 19c, 21c | Database |
Oracle E-Business Suite, versions 12.2.3-12.2.11 | Oracle E-Business Suite |
Oracle Enterprise Communications Broker, version 3.3 | Oracle Enterprise Communications Broker |
Oracle Enterprise Operations Monitor, versions 4.3, 4.4, 5.0 | Oracle Enterprise Operations Monitor |
Oracle Enterprise Session Border Controller, versions 8.4, 9.0, 9.1 | Oracle Enterprise Session Border Controller |
Oracle Essbase, version 21.3 | Database |
Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 | Oracle Financial Services Analytical Applications Infrastructure |
Oracle Financial Services Behavior Detection Platform, versions 8.0.7.0, 8.0.8.0, 8.1.1.0-8.1.2.1 | Oracle Financial Services Behavior Detection Platform |
Oracle Financial Services Crime and Compliance Management Studio, versions 8.0.8.2.0, 8.0.8.3.0 | Oracle Financial Services Crime and Compliance Management Studio |
Oracle Financial Services Enterprise Case Management, versions 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0-8.1.2.1 | Oracle Financial Services Enterprise Case Management |
Oracle Financial Services Revenue Management and Billing, versions 2.9.0.0.0, 2.9.0.1.0, 3.0.0.0.0-3.2.0.0.0, 4.0.0.0.0 | Oracle Financial Services Revenue Management and Billing |
Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition, versions 8.0.7.0, 8.0.8.0 | Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition |
Oracle FLEXCUBE Core Banking, versions 5.2, 11.6-11.8, 11.10 | Contact Support |
Oracle FLEXCUBE Private Banking, version 12.1 | Contact Support |
Oracle FLEXCUBE Universal Banking, versions 12.1-12.4, 14.0-14.3, 14.5 | Contact Support |
Oracle Global Lifecycle Management NextGen OUI Framework, versions prior to 13.9.4.2.10 | Fusion Middleware |
Oracle Global Lifecycle Management OPatch, versions prior to 12.2.0.1.30 | Global Lifecycle Management |
Oracle GoldenGate, versions [19c] prior to 19.1.0.0.220719, [21c] prior to 21.7.0.0.0 | Database |
Oracle GraalVM Enterprise Edition, versions 20.3.6, 21.3.2, 22.1.0 | Java SE |
Oracle Graph Server and Client, versions prior to 22.2.0 | Database |
Oracle Health Sciences Data Management Workbench, versions 2.4.8.7, 2.5.2.1, 3.0.0.0, 3.1.0.3 | Health Sciences |
Oracle Health Sciences Empirica Signal, versions 9.1.0.52, 9.2.0.52 | Health Sciences |
Oracle Health Sciences Information Manager, versions 3.0.0.1, 3.0.1.0-3.0.5.0 | HealthCare Applications |
Oracle Healthcare Foundation, versions 8.1.0, 8.2.0, 8.2.1 | HealthCare Applications |
Oracle Hospitality Cruise Shipboard Property Management System, version 20.2.1 | Oracle Hospitality Cruise Shipboard Property Management System |
Oracle Hospitality Inventory Management, version 9.1 | Oracle Hospitality Inventory Management |
Oracle Hospitality Materials Control, version 18.1 | Oracle Hospitality Materials Control |
Oracle Hospitality OPERA 5, version 5.6 | Oracle Hospitality OPERA 5 Property Services |
Oracle HTTP Server, versions 12.2.1.3.0, 12.2.1.4.0 | Fusion Middleware |
Oracle Identity Management Suite | Fusion Middleware |
Oracle Identity Manager Connector | Fusion Middleware |
Oracle Java SE, versions 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1 | Java SE |
Oracle Managed File Transfer, versions 12.2.1.3.0, 12.2.1.4.0 | Fusion Middleware |
Oracle Middleware Common Libraries and Tools, versions 12.2.1.3.0, 12.2.1.4.0 | Fusion Middleware |
Oracle NoSQL Database | NoSQL Database |
Oracle Policy Automation, versions 12.2.0-12.2.25 | Oracle Policy Automation |
Oracle Policy Automation for Mobile Devices, versions 12.2.0-12.2.24 | Oracle Policy Automation |
Oracle Product Lifecycle Analytics, version 3.6.1 | Oracle Supply Chain Products |
Oracle REST Data Services, versions prior to 22.1.1 | Database |
Oracle Retail Allocation, versions 15.0.3.1, 16.0.3 | Retail Applications |
Oracle Retail Bulk Data Integration, version 16.0.3 | Retail Applications |
Oracle Retail Customer Insights, versions 15.0.2, 16.0.2 | Retail Applications |
Oracle Retail Customer Management and Segmentation Foundation, versions 17.0, 18.0, 19.0 | Retail Applications |
Oracle Retail Extract Transform and Load, version 13.2.5 | Retail Applications |
Oracle Retail Financial Integration, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 | Retail Applications |
Oracle Retail Integration Bus, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 | Retail Applications |
Oracle Retail Merchandising System, versions 16.0.3, 19.0.1 | Retail Applications |
Oracle Retail Order Broker, versions 18.0, 19.1 | Retail Applications |
Oracle Retail Pricing, version 19.0.1 | Retail Applications |
Oracle Retail Sales Audit, versions 15.0.3.1, 16.0.3 | Retail Applications |
Oracle Retail Xstore Point of Service, versions 17.0.4, 18.0.3, 19.0.2, 20.0.1, 21.0.1 | Retail Applications |
Oracle SD-WAN Edge, versions 9.0, 9.1 | Oracle SD-WAN Edge |
Oracle Security Service, versions 12.2.1.3.0, 12.2.1.4.0 | Fusion Middleware |
Oracle SOA Suite, versions 12.2.1.3.0, 12.2.1.4.0 | Fusion Middleware |
Oracle Solaris, versions 10, 11 | Systems |
Oracle Spatial Studio, versions prior to 22.1.0 | Database |
Oracle SQL Developer | Database |
Oracle Stream Analytics, versions [19c] prior to 19.1.0.0.6.4 | Database |
Oracle TimesTen In-Memory Database, versions prior to 22.1.1.1.0 | Database |
Oracle Transportation Management, version 1.4.4 | Oracle Supply Chain Products |
Oracle Utilities Framework, versions 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.5.0.0.0 | Oracle Utilities Applications |
Oracle VM VirtualBox, versions prior to 6.1.36 | Virtualization |
Oracle WebCenter Content, versions 12.2.1.3.0, 12.2.1.4.0 | Fusion Middleware |
Oracle WebCenter Portal, versions 12.2.1.3.0, 12.2.1.4.0 | Fusion Middleware |
Oracle WebCenter Sites Support Tools, versions 4.4.2 and prior | Fusion Middleware |
Oracle WebLogic Server, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | Fusion Middleware |
Oracle Weblogic Server Proxy Plug-in, versions 12.2.1.3.0, 12.2.1.4.0 | Fusion Middleware |
Oracle ZFS Storage Appliance Kit, version 8.8 | Systems |
PeopleSoft Enterprise PeopleTools, versions 8.58, 8.59 | PeopleSoft |
Primavera Gateway, versions 17.12.0-17.12.11, 18.8.0-18.8.14, 19.12.0-19.12.13, 20.12.0-20.12.8, 21.12.0-21.12.1 | Oracle Construction and Engineering Suite |
Primavera P6 Enterprise Project Portfolio Management, versions 17.12.0.0-17.12.20.4, 18.8.0.0-18.8.25.4, 19.12.0.0-19.12.19.0, 20.12.0.0-20.12.14.0, 21.12.0.0-21.12.4.0 | Oracle Construction and Engineering Suite |
Primavera Unifier, versions 17.7-17.12, 18.8, 19.12, 20.12, 21.12 | Oracle Construction and Engineering Suite |
Siebel Applications, versions 22.6 and prior | Siebel |
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.
Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:
Date | Note |
---|---|
2022-October-31 | Rev 4. Updated Credit section |
2022-July-28 | Rev 3. Updated the affected versions WebLogic CVE-2021-40690 |
2022-July-25 | Rev 2. Updated the version details for WebCenter Sites Support Tools and Credit added for CVE-2022-21551 |
2022-July-19 | Rev 1. Initial Release. |
This Critical Patch Update contains 23 new security patches for Oracle Database Products divided as follows:
This Critical Patch Update contains 9 new security patches plus additional third party patches noted below for Oracle Database Products. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. 1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
CVE# | Component | Package and/or Privilege Required | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2020-35169 | Oracle Database - Enterprise Edition | None | TCPS | Yes | 9.1 | Network | Low | None | None | Un- changed | High | High | None | 12.1.0.2, 19c, 21c | |
CVE-2022-21510 | Oracle Database - Enterprise Edition Sharding | Local Logon | None | No | 8.8 | Local | Low | Low | None | Changed | High | High | High | None | See Note 1 |
CVE-2022-21511 | Oracle Database - Enterprise Edition Recovery | EXECUTE ON DBMS_IR.EXECUTESQLSCRIPT | Oracle Net | No | 7.2 | Network | Low | High | None | Un- changed | High | High | High | None | See Note 1 |
CVE-2022-21565 | Java VM | Create Procedure | Oracle Net | No | 6.5 | Network | Low | Low | None | Un- changed | None | High | None | 12.1.0.2, 19c, 21c | |
CVE-2022-24729 | Oracle Application Express (CKEditor) | User Account | HTTP | No | 5.7 | Network | Low | Low | Required | Un- changed | None | None | High | Prior to 22.1.1 | |
CVE-2021-41184 | Oracle Application Express (jQueryUI) | User Account | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | Prior to 22.1.1 | |
CVE-2022-0839 | Oracle SQLcl (Liquibase) | Local Logon | None | No | 5.0 | Local | Low | Low | Required | Un- changed | High | None | None | 19c | |
CVE-2021-45943 | Oracle Spatial and Graph (GDAL) | Create Session | Oracle Net | No | 4.3 | Network | Low | Low | None | Un- changed | None | None | Low | 19c, 21c | |
CVE-2022-21432 | Oracle Database - Enterprise Edition RDBMS Security | DBA role | Oracle Net | No | 2.7 | Network | Low | High | None | Un- changed | None | None | Low | 12.1.0.2, 19c, 21c |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Autonomous Health Framework. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Autonomous Health Framework. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Berkeley DB. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Berkeley DB. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 3 new security patches for Oracle Big Data Graph. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-42340 | Big Data Spatial and Graph | Big Data Graph (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | Prior to 23.1 | |
CVE-2020-36518 | Big Data Spatial and Graph | Big Data Graph (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | Prior to 23.1 | |
CVE-2021-41184 | Big Data Spatial and Graph | Big Data Graph (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 23.1 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Blockchain Platform. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Blockchain Platform. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 1 new security patch for Oracle Essbase. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-21508 | Oracle Essbase | Security and Provisioning | None | No | 5.8 | Local | Low | High | Required | Un- changed | High | High | None | 21.3 |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Global Lifecycle Management. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-23437 | Oracle Global Lifecycle Management OPatch | Patch Installer (Apache Xerces-J) | Local Logon | No | 4.2 | Local | Low | High | Required | Un- changed | None | None | High | Prior to 12.2.0.1.30 |
This Critical Patch Update contains 4 new security patches plus additional third party patches noted below for Oracle GoldenGate. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-3749 | Oracle GoldenGate | Oracle GoldenGate (axios) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 21c: prior to 21.7.0.0.0 | |
CVE-2022-21551 | Oracle GoldenGate | Oracle GoldenGate | HTTP | No | 6.8 | Network | Low | High | Required | Un- changed | High | High | High | 21c: prior to 21.7.0.0.0; 19c: prior to 19.1.0.0.220719 | |
CVE-2021-34429 | Oracle Stream Analytics | Oracle Stream Analytics (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | Low | None | None | 19c: prior to 19.1.0.0.6.4 | |
CVE-2021-37714 | Oracle Stream Analytics | Oracle Stream Analytics (jsoup) | HTTP | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 19c: prior to 19.1.0.0.6.4 |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Graph Server and Client. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2020-36518 | Oracle Graph Server and Client | Oracle Graph Server (jackson-databind) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | Prior to 22.2.0 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle NoSQL Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 2 new security patches for Oracle REST Data Services. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-41184 | Oracle REST Data Services | Oracle REST Data Services (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 22.1.1 | |
CVE-2021-34429 | Oracle REST Data Services | Oracle REST Data Services (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | Low | None | None | Prior to 22.1.1 |
This Critical Patch Update contains 1 new security patch for Oracle Spatial Studio. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2020-36518 | Oracle Spatial Studio | Oracle Spatial Studio (jackson-databind) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | Prior to 22.1.0 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle SQL Developer. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle SQL Developer. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle TimesTen In-Memory Database. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-2351 | Oracle TimesTen In-Memory Database | Oracle TimesTen In-Memory Database Cache | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | Prior to 22.1.1.1.0 |
This Critical Patch Update contains 12 new security patches for Oracle Commerce. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2020-10683 | Oracle Commerce Guided Search | Content Acquisition System (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 11.3.2 | |
CVE-2019-17495 | Oracle Commerce Guided Search | Framework, Experience Manager (Swagger UI) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 11.3.2 | |
CVE-2022-22965 | Oracle Commerce Platform | Endeca Integration (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 11.3.2 | |
CVE-2020-28052 | Oracle Commerce Guided Search | Framework, Experience Manager (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed | High | High | High | 11.3.2 | |
CVE-2021-40690 | Oracle Commerce Guided Search | Content Acquisition System (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 11.3.2 | |
CVE-2021-22946 | Oracle Commerce Guided Search | Framework, Experience Manager (cURL) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 11.3.2 | |
CVE-2022-24729 | Oracle Commerce Merchandising | Core (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 11.3.2 | |
CVE-2020-36518 | Oracle Commerce Platform | Dynamo Application Framework (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 11.3.0, 11.3.1, 11.3.2 | |
CVE-2021-40690 | Oracle Commerce Platform | Endeca Integration (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 11.3.2 | |
CVE-2021-3450 | Oracle Commerce Guided Search | Framework, Experience Manager (OpenSSL) | TLS | Yes | 7.4 | Network | High | None | None | Un- changed | High | High | None | 11.3.2 | |
CVE-2020-7712 | Oracle Commerce Guided Search | Framework, Experience Manager (Apache ZooKeeper) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed | High | High | High | 11.3.2 | |
CVE-2022-21559 | Oracle Commerce Platform | Dynamo Application Framework | None | No | 5.5 | Local | Low | Low | None | Un- changed | High | None | None | 11.3.0, 11.3.1, 11.3.2 |
This Critical Patch Update contains 17 new security patches plus additional third party patches noted below for Oracle Communications Applications. 12 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-23305 | Oracle Communications Instant Messaging Server | XMPP Server (Apache Log4j) | XMPP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 10.0.1.5.0 | |
CVE-2022-23305 | Oracle Communications Offline Mediation Controller | Charging Server (Apache Log4j) | LDAP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | Prior to 12.0.0.4.4, Prior to 12.0.0.5.1 | |
CVE-2022-23632 | Oracle Communications Unified Inventory Management | Cloud Native (Traefik) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 7.5.0 | |
CVE-2022-22965 | Oracle Communications Unified Inventory Management | TMF APIs (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 7.4.1, 7.4.2, 7.5.0 | |
CVE-2022-21429 | Oracle Communications Billing and Revenue Management | Billing Care | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed | High | High | High | 12.0.0.4.0-12.0.0.6.0 | |
CVE-2020-36518 | Oracle Communications Billing and Revenue Management | Billing Care, BOC, DM Kafka, REST API (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 12.0.0.4.0-12.0.0.6.0 | |
CVE-2021-37137 | Oracle Communications BRM - Elastic Charging Engine | 5G gateway (Google Snappy) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | Prior to 12.0.0.4.6, Prior to 12.0.0.5.1 | |
CVE-2021-43859 | Oracle Communications BRM - Elastic Charging Engine | EM Gateway (XStream) | TCP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | Prior to 12.0.0.4.6, Prior to 12.0.0.5.1 | |
CVE-2021-44832 | Oracle Communications BRM - Elastic Charging Engine | Charging Server (Apache Log4j) | TCP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | Prior to 12.0.0.4.6, Prior to 12.0.0.5.1 | |
CVE-2021-44832 | Oracle Communications Offline Mediation Controller | Admin Server and Node Manager (Apache Log4j) | LDAP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | Prior to 12.0.0.4.4, Prior to 12.0.0.5.1 | |
CVE-2022-23437 | Oracle Communications ASAP | SRT (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 7.3 | |
CVE-2022-21573 | Oracle Communications Billing and Revenue Management | Billing Care | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | 12.0.0.4.0-12.0.0.6.0 | |
CVE-2021-43797 | Oracle Communications Design Studio | PSR Designer (Netty) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | High | None | 7.4.2 | |
CVE-2022-22969 | Oracle Communications Design Studio | Patch Request (Spring Security OAuth) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | 7.4.2 | |
CVE-2021-38153 | Oracle Communications BRM - Elastic Charging Engine | Notifications (Apache Kafka) | TCP | Yes | 5.9 | Network | High | None | None | Un- changed | High | None | None | Prior to 12.0.0.4.6, Prior to 12.0.0.5.1 | |
CVE-2022-21572 | Oracle Communications Billing and Revenue Management | Billing Care | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 12.0.0.4.0-12.0.0.6.0 | |
CVE-2022-21574 | Oracle Communications Billing and Revenue Management | Connection Manager | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | None | None | Low | 12.0.0.4.0-12.0.0.6.0 |
This Critical Patch Update contains 56 new security patches plus additional third party patches noted below for Oracle Communications. 45 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-22947 | Oracle Communications Cloud Native Core Binding Support Function | BSF (Spring Cloud Gateway) | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 22.1.3 | |
CVE-2022-22947 | Oracle Communications Cloud Native Core Console | CNC Console (Spring Cloud Gateway) | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 22.2.0 | |
CVE-2022-22947 | Oracle Communications Cloud Native Core Network Repository Function | NRF (Spring Cloud Gateway) | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 22.1.2, 22.2.0 | |
CVE-2022-22947 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (Spring Cloud Gateway) | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 22.1.1 | |
CVE-2022-22965 | Oracle Communications Cloud Native Core Binding Support Function | BSF (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.3 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Binding Support Function | BSF (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.3 | |
CVE-2022-1154 | Oracle Communications Cloud Native Core Network Exposure Function | NEF (vim) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.1 | |
CVE-2020-14343 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (PyYAML) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.0 | |
CVE-2021-3177 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (Python) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.2.0 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.0 | |
CVE-2022-22963 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | DBTier (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.2 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Network Repository Function | NRF (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.2, 22.2.0 | |
CVE-2022-22963 | Oracle Communications Cloud Native Core Policy | Policy (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.3 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.1.1 | |
CVE-2022-25845 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (fastjson) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.2.0 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 22.2.0 | |
CVE-2022-23219 | Oracle Enterprise Operations Monitor | Mediation Engine (glibc) | TCP/IP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 4.3, 4.4, 5.0 | |
CVE-2022-24407 | Oracle Communications Cloud Native Core Console | CNC Console (Cyrus SASL) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed | High | High | High | 22.2.0 | |
CVE-2022-24407 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (Cyrus SASL) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed | High | High | High | 22.2.0 | |
CVE-2022-24407 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (Cyrus SASL) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed | High | High | High | 22.1.1 | |
CVE-2022-25636 | Oracle Communications Cloud Native Core Binding Support Function | Oracle Linux | None | No | 7.8 | Local | Low | Low | None | Un- changed | High | High | High | 22.1.3 | |
CVE-2022-25636 | Oracle Communications Cloud Native Core Network Exposure Function | Oracle Linux | None | No | 7.8 | Local | Low | Low | None | Un- changed | High | High | High | 22.1.1 | |
CVE-2022-25636 | Oracle Communications Cloud Native Core Policy | Oracle Linux | None | No | 7.8 | Local | Low | Low | None | Un- changed | High | High | High | 22.2.0 | |
CVE-2022-24735 | Oracle Communications Operations Monitor | Fraud Detection Monitor (Redis) | None | No | 7.8 | Local | Low | None | Required | Un- changed | High | High | High | 4.3, 4.4, 5.0 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Binding Support Function | BSF (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.3 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Binding Support Function | BSF (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.2.0 | |
CVE-2018-25032 | Oracle Communications Cloud Native Core Console | CNC Console (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.2 | |
CVE-2018-25032 | Oracle Communications Cloud Native Core Network Exposure Function | NEF (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.1 | |
CVE-2019-20916 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (Package Installer for Python) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | High | None | 22.1.0 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.0 | |
CVE-2021-22119 | Oracle Communications Cloud Native Core Network Repository Function | NRF (Spring Security) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.2, 22.2.0 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Network Repository Function | NRF (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.2, 22.2.0 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Network Repository Function | NRF (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.2, 22.2.0 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Network Slice Selection Function | NSSF (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.1 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Network Slice Selection Function | NSSF (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.1 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.1 | |
CVE-2018-25032 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.1 | |
CVE-2022-0778 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.1.1 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Service Communication Proxy | SCP (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.2.0 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.2.0 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.2.0 | |
CVE-2018-25032 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.2.0 | |
CVE-2022-0778 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 22.2.0 | |
CVE-2022-0778 | Oracle Communications Core Session Manager | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.2.5, 8.4.5 | |
CVE-2022-0778 | Oracle Communications Operations Monitor | Mediation Engine (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 4.3, 4.4, 5.0 | |
CVE-2022-0778 | Oracle Communications Session Border Controller | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.4, 9.0, 9.1 | |
CVE-2022-0778 | Oracle Communications Unified Session Manager | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.2.5 | |
CVE-2022-0778 | Oracle Enterprise Communications Broker | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 3.3 | |
CVE-2022-0778 | Oracle Enterprise Session Border Controller | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.4, 9.0, 9.1 | |
CVE-2020-36518 | Oracle SD-WAN Edge | MGMT (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 9.0, 9.1 | |
CVE-2022-1271 | Oracle Communications Cloud Native Core Console | CNC Console (GNU Gzip) | HTTP | No | 7.1 | Network | High | Low | Required | Un- changed | High | High | High | 22.1.2 | |
CVE-2022-1271 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (GNU Gzip) | HTTP | No | 7.1 | Network | High | Low | Required | Un- changed | High | High | High | 22.2.0 | |
CVE-2021-37750 | Oracle Communications Cloud Native Core Network Slice Selection Function | NSSF (MIT Kerberos) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | 22.1.1 | |
CVE-2021-3572 | Oracle Communications Cloud Native Core Policy | Policy (Package Installer for Python) | HTTP | No | 5.7 | Network | Low | Low | Required | Un- changed | None | High | None | 22.1.3 | |
CVE-2022-24329 | Oracle Communications Cloud Native Core Binding Support Function | BSF (JetBrains Kotlin) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | None | Low | None | 22.1.3 | |
CVE-2021-34141 | Oracle Communications Cloud Native Core Policy | Policy (NumPy) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | None | None | Low | 22.1.3 |
This Critical Patch Update contains 7 new security patches plus additional third party patches noted below for Oracle Construction and Engineering. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-21558 | Oracle Crystal Ball | Installation | None | No | 7.8 | Local | High | Low | None | Changed | High | High | High | 11.1.2.0.000-11.1.2.4.900 | |
CVE-2020-36518 | Primavera Gateway | Admin (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 17.12.0-17.12.11, 18.8.0-18.8.14, 19.12.0-19.12.13, 20.12.0-20.12.8, 21.12.0-21.12.1 | |
CVE-2020-36518 | Primavera Unifier | Document Management (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 17.7-17.12, 18.8, 19.12, 20.12, 21.12 | |
CVE-2022-23437 | Primavera Gateway | Admin (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 17.12.0-17.12.11, 18.8.0-18.8.14, 19.12.0-19.12.13, 20.12.0-20.12.8 | |
CVE-2020-36518 | Primavera P6 Enterprise Project Portfolio Management | Web Access (jackson-databind) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | 17.12.0.0-17.12.20.4, 18.8.0.0-18.8.25.4, 19.12.0.0-19.12.19.0, 20.12.0.0-20.12.14.0, 21.12.0.0-21.12.4.0 | |
CVE-2022-23437 | Primavera Unifier | Platform, User Interface (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 17.7-17.12, 18.8, 19.12, 20.12, 21.12 | |
CVE-2022-30126 | Primavera Unifier | Document Management (Apache Tika) | None | No | 5.5 | Local | Low | None | Required | Un- changed | None | None | High | 17.7-17.12, 18.8, 19.12, 20.12, 21.12 |
This Critical Patch Update contains 6 new security patches for Oracle E-Business Suite. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the July 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (July 2022), My Oracle Support Note 2484000.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-23305 | Oracle E-Business Suite Information Discovery | Packaging issues (Apache Log4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 12.2.3-12.2.11 | |
CVE-2022-21566 | Oracle Applications Framework | Diagnostics | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 12.2.9-12.2.11 | |
CVE-2022-21500 | Oracle User Management | Proxy User Delegation | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 12.2.4-12.2.11 | |
CVE-2022-21567 | Oracle Workflow | Worklist | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 12.2.3-12.2.11 | |
CVE-2022-21568 | Oracle iReceivables | Access Request | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | High | None | None | 12.2.3-12.2.11 | |
CVE-2022-21545 | Oracle iRecruitment | Candidate Self Service Registration | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | Low | None | None | 12.2.3-12.2.11 |
This Critical Patch Update contains 6 new security patches plus additional third party patches noted below for Oracle Enterprise Manager. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the July 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2867874.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-22721 | Enterprise Manager Ops Center | Networking (Apache HTTP Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 12.4.0.0 | |
CVE-2022-1292 | Enterprise Manager Ops Center | Networking (OpenSSL) | HTTPS | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 12.4.0.0 | |
CVE-2022-21536 | Enterprise Manager Base Platform | Policy Framework | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed | High | High | High | 13.4.0.0, 13.5.0.0 | |
CVE-2020-5258 | Oracle Application Testing Suite | Load Testing for Web Apps (Dojo) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | High | None | 13.3.0.1 | |
CVE-2022-21516 | Enterprise Manager Base Platform | Enterprise Manager Install | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed | Low | Low | Low | 13.4.0.0, 13.5.0.0 | |
CVE-2022-29577 | Enterprise Manager Base Platform | Enterprise Manager Install (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 13.4.0.0, 13.5.0.0 |
This Critical Patch Update contains 59 new security patches for Oracle Financial Services Applications. 38 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-22963 | Oracle Banking Branch | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Cash Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Corporate Lending Process Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Credit Facilities Process Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Electronic Data Exchange for Corporates | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Liquidity Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.2, 14.5 | |
CVE-2022-22963 | Oracle Banking Origination | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Supply Chain Finance | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Trade Finance Process Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Virtual Account Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.5 | |
CVE-2021-41303 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Shiro) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2018-1273 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Spring Data Commons) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-22978 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Spring Security) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2020-9492 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Hadoop) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed | High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2020-9492 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Solr) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed | High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-24729 | Oracle Financial Services Analytical Applications Infrastructure | Others (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 | |
CVE-2020-36518 | Oracle Financial Services Analytical Applications Infrastructure | Others (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 | |
CVE-2022-24729 | Oracle Financial Services Behavior Detection Platform | Third Party (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.7.0, 8.0.8.0, 8.1.1.0-8.1.2.1 | |
CVE-2020-36518 | Oracle Financial Services Behavior Detection Platform | Web UI (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.7.0, 8.0.8.0, 8.1.1.0-8.1.2.1 | |
CVE-2021-36090 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-38296 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Spark) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-25647 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Google GSON) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2020-36518 | Oracle Financial Services Crime and Compliance Management Studio | Studio (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-37714 | Oracle Financial Services Crime and Compliance Management Studio | Studio (jsoup) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-24729 | Oracle Financial Services Enterprise Case Management | Installers (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0-8.1.2.1 | |
CVE-2020-36518 | Oracle Financial Services Enterprise Case Management | Installers (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0-8.1.2.1 | |
CVE-2022-24729 | Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition | User Interface (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.7.0, 8.0.8.0 | |
CVE-2020-36518 | Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition | User Interface (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.7.0, 8.0.8.0 | |
CVE-2021-40690 | Oracle FLEXCUBE Private Banking | Infrastructure (Apache Santuario XML Security For Java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 12.1 | |
CVE-2021-43859 | Oracle FLEXCUBE Private Banking | Infrastructure (XStream) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 12.1 | |
CVE-2020-7712 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache ZooKeeper) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed | High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-23337 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed | High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-21544 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 7.1 | Network | High | Low | Required | Un- changed | High | High | High | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2022-23181 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Tomcat) | None | No | 7.0 | Local | High | Low | None | Un- changed | High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-21582 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed | High | High | Low | 14.5 | |
CVE-2022-21585 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed | High | High | Low | 14.5 | |
CVE-2022-21428 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed | High | High | Low | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2022-21578 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed | High | High | Low | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2021-44832 | Oracle FLEXCUBE Private Banking | Infrastructure (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | 12.1 | |
CVE-2022-23437 | Oracle Banking Deposits and Lines of Credit Servicing | Web UI (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 2.7 | |
CVE-2021-43797 | Oracle Banking Deposits and Lines of Credit Servicing | Web UI (Netty) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | High | None | 2.7 | |
CVE-2022-23437 | Oracle Banking Party Management | Web UI (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 2.7 | |
CVE-2021-43797 | Oracle Banking Party Management | Web UI (Netty) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | High | None | 2.7 | |
CVE-2021-43797 | Oracle Banking Platform | SECURITY (Netty) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | High | None | 2.6.2 | |
CVE-2022-23437 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-22971 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Spring Framework) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-23437 | Oracle FLEXCUBE Universal Banking | Infrastructure (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 12.4 | |
CVE-2022-21583 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.4 | Network | High | Low | None | Un- changed | High | Low | Low | 14.5 | |
CVE-2022-21584 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.4 | Network | High | Low | Required | Un- changed | High | High | None | 14.5 | |
CVE-2022-21586 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.4 | Network | High | Low | Required | Un- changed | High | High | None | 14.5 | |
CVE-2022-21576 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.4 | Network | High | Low | None | Un- changed | High | Low | Low | 12.3, 12.4, 14.0-14.3, 14.5 | |
CVE-2022-21577 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.4 | Network | High | Low | Required | Un- changed | High | High | None | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2022-21579 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.4 | Network | High | Low | Required | Un- changed | High | High | None | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2021-41184 | Oracle Banking Platform | SECURITY (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 2.9, 2.12 | |
CVE-2022-21581 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 5.9 | Network | High | Low | Required | Un- changed | Low | High | Low | 14.5 | |
CVE-2022-21580 | Oracle Financial Services Revenue Management and Billing | Infrastructure | HTTP | No | 5.9 | Network | High | Low | Required | Un- changed | High | Low | Low | 2.9.0.0.0, 2.9.0.1.0, 3.0.0.0.0-3.2.0.0.0, 4.0.0.0.0 | |
CVE-2022-24823 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Netty) | None | No | 5.5 | Local | Low | Low | None | Un- changed | High | None | None | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-34429 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | Low | None | None | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-29425 | Oracle FLEXCUBE Core Banking | Securities (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed | Low | Low | None | 5.2, 11.6-11.8, 11.10 |
This Critical Patch Update contains 3 new security patches for Oracle Food and Beverage Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-2351 | Oracle Hospitality Inventory Management | Installation (ODP for .NET) | Oracle Net | Yes | 7.5 | Network | High | None | Required | Un- changed | High | High | High | 9.1 | |
CVE-2021-41184 | Oracle Hospitality Inventory Management | Receipt (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.1 | |
CVE-2021-41184 | Oracle Hospitality Materials Control | Receipt (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 18.1 |
This Critical Patch Update contains 38 new security patches plus additional third party patches noted below for Oracle Fusion Middleware. 32 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update July 2022 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2880163.2.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-42575 | Oracle Middleware Common Libraries and Tools | Third Party Patch (AntiSamy) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2022-23457 | Oracle WebLogic Server | Centralized Third Party Jars (OWASP Enterprise Security API) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-23450 | Oracle WebLogic Server | Sample apps (Dojo) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-22965 | Oracle WebLogic Server | Third Party Tools, Samples (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2019-10082 | Oracle HTTP Server | SSL Module (Apache HTTP Server) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed | High | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-35169 | Oracle HTTP Server | SSL Module (Dell BSAFE Micro Edition Suite) | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed | High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-23926 | Oracle Middleware Common Libraries and Tools | Thirdparty Patch (Apache XMLBeans) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed | High | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-35169 | Oracle Security Service | C Oracle SSL API (Dell BSAFE Micro Edition Suite) | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed | High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-26291 | Oracle WebLogic Server | Centralized Third Party Jars (Apache Maven) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed | High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-35169 | Oracle Weblogic Server Proxy Plug-in | SSL Module (Dell BSAFE Micro Edition Suite) | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed | High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-39139 | Oracle WebCenter Portal | Security Framework (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed | High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2351 | Oracle WebLogic Server | Installer (OCCI) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-11987 | Oracle WebLogic Server | Centralized Third Party Jars (Apache Batik) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed | High | Low | None | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2019-0227 | Oracle BI Publisher | BI Publisher Security (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network | High | None | None | Un- changed | High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-36518 | Oracle Coherence | Centralized Thirdparty Jars (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 14.1.1.0.0 | |
CVE-2022-21570 | Oracle Coherence | Core | T3, IIOP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 3.7.1.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-36518 | Oracle Global Lifecycle Management NextGen OUI Framework | NextGen Installer issues (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | Prior to 13.9.4.2.10 | |
CVE-2021-42340 | Oracle Managed File Transfer | MFT Runtime Server (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-37714 | Oracle Middleware Common Libraries and Tools | Thirdparty Patch (jsoup) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2022-21562 | Oracle SOA Suite | Fabric Layer | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-36518 | Oracle WebLogic Server | Centralized Third Party Jars (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-24839 | Oracle WebLogic Server | Centralized Third Party Jars (NekoHTML) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-28491 | Oracle WebLogic Server | Centralized Third Party Jars (jackson-dataformats-binary) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-40690 | Oracle WebLogic Server | Centralized Thirdparty Jars (Apache Santuario XML Security For Java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-21552 | Oracle WebCenter Content | Search | HTTP | Yes | 7.2 | Network | Low | None | None | Changed | Low | Low | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-35940 | Oracle HTTP Server | SSL Module (Apache Portable Runtime) | None | No | 7.1 | Local | Low | Low | None | Un- changed | High | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-30129 | Oracle Global Lifecycle Management NextGen OUI Framework | NextGen Installer issues (Apache MINA SSHD) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | Prior to 13.9.4.2.10 | |
CVE-2022-23437 | Oracle Global Lifecycle Management NextGen OUI Framework | NextGen Installer issues (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | Prior to 13.9.4.2.10 | |
CVE-2022-21548 | Oracle WebLogic Server | Core | T3, IIOP | Yes | 6.5 | Network | Low | None | None | Un- changed | None | Low | Low | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-11023 | Oracle Business Intelligence Enterprise Edition | Service Administration UI (JQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 5.9.0.0.0 | |
CVE-2020-1927 | Oracle HTTP Server | SSL Module (Apache HTTP Server) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2022-29577 | Oracle WebLogic Server | Centralized Third Party Jars (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-21575 | Oracle WebCenter Sites Support Tools | User Interface | HTTP | No | 6.0 | Network | Low | High | None | Un- changed | High | Low | Low | 4.4.2 and Prior | |
CVE-2022-21557 | Oracle WebLogic Server | Web Container | None | No | 5.7 | Local | High | High | None | Un- changed | High | High | None | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2019-0220 | Oracle HTTP Server | Web Listener (Apache HTTP Server) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | Low | None | None | 12.2.1.3.0 | |
CVE-2022-21560 | Oracle WebLogic Server | Core | T3, IIOP | Yes | 5.3 | Network | Low | None | None | Un- changed | None | None | Low | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-21564 | Oracle WebLogic Server | Web Services | T3, IIOP | Yes | 5.3 | Network | Low | None | None | Un- changed | None | None | Low | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-21523 | Oracle BI Publisher | BI Publisher Security | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed | Low | None | None | 12.2.1.3.0, 12.2.1.4.0 |
This Critical Patch Update contains 6 new security patches for Oracle Health Sciences Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2020-36518 | Oracle Health Sciences Empirica Signal | Web Services (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 9.1.0.52, 9.2.0.52 | |
CVE-2019-10086 | Oracle Health Sciences Data Management Workbench | User Interface (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed | Low | Low | Low | 2.5.2.1, 3.0.0.0 | |
CVE-2021-23337 | Oracle Health Sciences Data Management Workbench | User Interface (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed | High | High | High | 2.5.2.1, 3.0.0.0 | |
CVE-2021-44832 | Oracle Health Sciences Data Management Workbench | User Interface (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | 2.5.2.1, 3.0.0.0, 3.1.0.3 | |
CVE-2022-21518 | Oracle Health Sciences Data Management Workbench | User Interface | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | High | None | None | 2.4.8.7, 2.5.2.1 | |
CVE-2021-29425 | Oracle Health Sciences Data Management Workbench | User Interface (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed | Low | Low | None | 2.5.2.1, 3.0.0.0 |
This Critical Patch Update contains 3 new security patches for Oracle HealthCare Applications. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-33813 | Oracle Healthcare Foundation | Upload Service (Apache Tika) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.1.0, 8.2.0, 8.2.1 | |
CVE-2022-23437 | Oracle Health Sciences Information Manager | Health Policy Engine (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 3.0.0.1, 3.0.1.0-3.0.5.0 | |
CVE-2021-36374 | Oracle Health Sciences Information Manager | Health Policy Engine (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed | None | None | High | 3.0.0.1, 3.0.1.0-3.0.5.0 |
This Critical Patch Update contains 2 new security patches for Oracle Hospitality Applications. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-31805 | Oracle Hospitality OPERA 5 | Login (Apache Struts) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 5.6 | |
CVE-2022-29885 | Oracle Hospitality Cruise Shipboard Property Management System | Next-Gen SPMS (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 20.2.1 |
This Critical Patch Update contains 5 new security patches for Oracle Java SE. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-34169 | Oracle Java SE, Oracle GraalVM Enterprise Edition | JAXP (Xalan-J) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed | None | High | None | Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 | See Note 1 |
CVE-2022-25647 | Oracle GraalVM Enterprise Edition | Native Image (Gson) | None | No | 6.2 | Local | Low | None | None | Un- changed | None | None | High | Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 | |
CVE-2022-21541 | Oracle Java SE, Oracle GraalVM Enterprise Edition | Hotspot | Multiple | Yes | 5.9 | Network | High | None | None | Un- changed | None | High | None | Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 | See Note 1 |
CVE-2022-21540 | Oracle Java SE, Oracle GraalVM Enterprise Edition | Hotspot | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed | Low | None | None | Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 | See Note 1 |
CVE-2022-21549 | Oracle Java SE, Oracle GraalVM Enterprise Edition | Libraries | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed | None | Low | None | Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2, 22.1.0 | See Note 1 |
This Critical Patch Update contains 6 new security patches for Oracle JD Edwards. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-22931 | JD Edwards EnterpriseOne Tools | E1 Dev Platform Tech - Cloud (Node.js) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 9.2.6.1 and prior | |
CVE-2021-31684 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator (JSON Smart) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 9.2.6.3 and prior | |
CVE-2022-21542 | JD Edwards EnterpriseOne Tools | Web Runtime | HTTP | No | 7.4 | Network | Low | Low | None | Changed | Low | Low | Low | 9.2.6.3 and prior | |
CVE-2022-21561 | JD Edwards EnterpriseOne Tools | Web Runtime | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed | High | None | None | 9.2.6.3 and prior | |
CVE-2021-41184 | JD Edwards EnterpriseOne Tools | Web Runtime (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.2.6.3 and prior | |
CVE-2022-21532 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed | Low | None | None | 9.2.6.3 and prior |
This Critical Patch Update contains 34 new security patches plus additional third party patches noted below for Oracle MySQL. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-31805 | MySQL Enterprise Monitor | Monitoring: General (Apache Struts) | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 8.0.30 and prior | |
CVE-2022-1292 | MySQL Server | Server: Packaging (OpenSSL) | MySQL Protocol | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 5.7.38 and prior, 8.0.29 and prior | |
CVE-2022-1292 | MySQL Workbench | Workbench (OpenSSL) | MySQL Workbench | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 8.0.29 and prior | |
CVE-2022-21824 | MySQL Cluster | Cluster: General (Node.js) | Multiple | Yes | 8.2 | Network | Low | None | None | Un- changed | None | Low | High | 8.0.29 and prior | |
CVE-2022-27778 | MySQL Server | Server: Packaging (cURL) | MySQL Protocol | Yes | 8.1 | Network | Low | None | Required | Un- changed | None | High | High | 5.7.38 and prior, 8.0.29 and prior | |
CVE-2021-22119 | MySQL Enterprise Monitor | Monitoring: General (Spring Security) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.25 and prior | |
CVE-2018-25032 | MySQL Server | Server: Compiling (zlib) | MySQL Protocol | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 5.7.38 and prior, 8.0.29 and prior | |
CVE-2022-23308 | MySQL Workbench | Workbench (libxml2) | MySQL Workbench | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2020-26237 | MySQL Enterprise Monitor | Monitoring: General (highlight.js) | Multiple | No | 6.8 | Network | Low | Low | Required | Changed | None | High | None | 8.0.30 and prior | |
CVE-2022-21556 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | High | None | Un- changed | None | High | High | 8.0.28 and prior | |
CVE-2022-21569 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21550 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Adjacent Network | High | High | Required | Un- changed | High | High | High | 7.4.36 and prior,7.5.26 and prior, 7.6.22 and prior, and 8.0.29 and prior | |
CVE-2022-21519 | MySQL Cluster | Cluster: General | Multiple | Yes | 5.9 | Network | High | None | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21527 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed | None | Low | High | 8.0.29 and prior | |
CVE-2022-21528 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed | None | Low | High | 8.0.29 and prior | |
CVE-2022-21509 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed | None | Low | High | 8.0.29 and prior | |
CVE-2022-22968 | MySQL Enterprise Monitor | Service Manager (Spring Framework) | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed | None | Low | None | 8.0.29 and prior | |
CVE-2022-21539 | MySQL Server | InnoDB | MySQL Protocol | No | 5.0 | Network | High | Low | None | Un- changed | Low | Low | Low | 8.0.29 and prior | |
CVE-2022-21517 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21537 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21547 | MySQL Server | Server: Federated | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21525 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21526 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21529 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21530 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21531 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21553 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21515 | MySQL Server | Server: Options | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 5.7.38 and prior, 8.0.29 and prior | |
CVE-2022-21455 | MySQL Server | Server: PAM Auth Plugin | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | High | None | 8.0.28 and prior | |
CVE-2022-21534 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21522 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed | None | None | High | 8.0.29 and prior | |
CVE-2022-21555 | MySQL Shell for VS Code | Shell: GUI | None | No | 4.2 | Local | Low | High | Required | Changed | Low | Low | None | 1.1.8 and prior | |
CVE-2022-21538 | MySQL Server | Server: Security: Encryption | MySQL Protocol | No | 3.1 | Network | High | Low | None | Un- changed | None | None | Low | 8.0.29 and prior | |
CVE-2022-21535 | MySQL Shell | Shell: General/Core Client | None | No | 2.5 | Local | High | None | Required | Un- changed | None | None | Low | 8.0.28 and prior |
This Critical Patch Update contains 11 new security patches for Oracle PeopleSoft. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-21543 | PeopleSoft Enterprise PeopleTools | Updates Environment Mgmt | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 8.58, 8.59 | |
CVE-2020-36518 | PeopleSoft Enterprise PeopleTools | Elastic Search (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.58, 8.59 | |
CVE-2018-25032 | PeopleSoft Enterprise PeopleTools | PeopleSoft CDA (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.58, 8.59 | |
CVE-2022-24729 | PeopleSoft Enterprise PeopleTools | Rich Text Editor (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.58, 8.59 | |
CVE-2021-31684 | PeopleSoft Enterprise PeopleTools | Security (JSON Smart) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 8.58, 8.59 | |
CVE-2022-23437 | PeopleSoft Enterprise PeopleTools | Security (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 8.58, 8.59 | |
CVE-2022-21520 | PeopleSoft Enterprise PeopleTools | Fluid Core | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.58, 8.59 | |
CVE-2020-7656 | PeopleSoft Enterprise PeopleTools | PeopleSoft CDA (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.58 | |
CVE-2021-41182 | PeopleSoft Enterprise PeopleTools | XML Publisher (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.58, 8.59 | |
CVE-2022-21521 | PeopleSoft Enterprise PeopleTools | XML Publisher | HTTP | No | 4.9 | Network | Low | High | None | Un- changed | High | None | None | 8.58, 8.59 | |
CVE-2022-21512 | PeopleSoft Enterprise PeopleTools | Integration Broker | None | No | 4.4 | Local | Low | High | None | Un- changed | High | None | None | 8.58, 8.59 |
This Critical Patch Update contains 3 new security patches for Oracle Policy Automation. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-44832 | Oracle Policy Automation | Determinations Engine (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | 12.2.0-12.2.24 | |
CVE-2021-44832 | Oracle Policy Automation for Mobile Devices | Core Functionality (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | 12.2.0-12.2.24 | |
CVE-2021-41184 | Oracle Policy Automation | Determinations Engine (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.0-12.2.25 |
This Critical Patch Update contains 17 new security patches for Oracle Retail Applications. 13 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-22965 | Oracle Retail Bulk Data Integration | BDI Job Scheduler (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 16.0.3 | |
CVE-2022-22965 | Oracle Retail Customer Management and Segmentation Foundation | Security (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 17.0, 18.0, 19.0 | |
CVE-2022-23305 | Oracle Retail Extract Transform and Load | Mathematical Operators (Apache Log4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 13.2.5 | |
CVE-2022-22965 | Oracle Retail Financial Integration | PeopleSoft Integration Bugs (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 | |
CVE-2022-22965 | Oracle Retail Integration Bus | RIB Kernal (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 | |
CVE-2022-22965 | Oracle Retail Merchandising System | Foundation (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 16.0.3, 19.0.1 | |
CVE-2021-29505 | Oracle Retail Customer Insights | Other (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed | High | High | High | 15.0.2, 16.0.2 | |
CVE-2021-22118 | Oracle Retail Customer Insights | Other (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed | High | High | High | 16.0.2 | |
CVE-2022-25647 | Oracle Retail Order Broker | System Administration (Google GSON) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 18.0, 19.1 | |
CVE-2020-36518 | Oracle Retail Sales Audit | others (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 15.0.3.1 | |
CVE-2019-10086 | Oracle Retail Allocation | General (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed | Low | Low | Low | 15.0.3.1, 16.0.3 | |
CVE-2019-10086 | Oracle Retail Sales Audit | others (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed | Low | Low | Low | 16.0.3 | |
CVE-2021-44832 | Oracle Retail Order Broker | Internal Operations (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | 18.0, 19.1 | |
CVE-2021-44832 | Oracle Retail Xstore Point of Service | Xenvironment (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | 17.0.4, 18.0.3, 19.0.2, 20.0.1, 21.0.1 | |
CVE-2021-29425 | Oracle Retail Merchandising System | Foundation (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed | Low | Low | None | 16.0.3, 19.0.1 | |
CVE-2021-29425 | Oracle Retail Pricing | Pricing - Security (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed | Low | Low | None | 19.0.1 | |
CVE-2021-29425 | Oracle Retail Xstore Point of Service | Xenvironment (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed | Low | Low | None | 17.0.4, 18.0.3, 19.0.2, 20.0.1 |
This Critical Patch Update contains 1 new security patch for Oracle Siebel CRM. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2021-31812 | Siebel Apps - Field Service | Smart Answer (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed | None | None | High | 22.6 and prior |
This Critical Patch Update contains 24 new security patches for Oracle Supply Chain. 19 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2020-10683 | Oracle Agile Engineering Data Management | Installation Issues (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 6.2.1.0 | |
CVE-2019-0219 | Oracle Transportation Management | Mobile Applications (Apache cordova-plugin-inappbrowser) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed | High | High | High | 1.4.4 | |
CVE-2022-25762 | Oracle Agile PLM | Security (Apache Tomcat) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed | High | Low | Low | 9.3.6 | |
CVE-2021-2351 | Oracle Agile Product Lifecycle Management for Process | Reporting (ODP for .NET) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 6.2.2, 6.2.3 | |
CVE-2020-11987 | Oracle Agile Engineering Data Management | Installation Issues (Apache Batik) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed | High | Low | None | 6.2.1.0 | |
CVE-2020-11987 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Batik) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed | High | Low | None | 3.6.1 | |
CVE-2021-22118 | Oracle Product Lifecycle Analytics | Installation Issues (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed | High | High | High | 3.6.1 | |
CVE-2021-42340 | Oracle Agile Engineering Data Management | Installation Issues (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 6.2.1.0 | |
CVE-2021-40690 | Oracle Agile PLM | Security (Apache Santuario XML Security For Java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | High | None | None | 9.3.6 | |
CVE-2020-25649 | Oracle Agile PLM | Security (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | High | None | 9.3.6 | |
CVE-2019-0227 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network | High | None | None | Un- changed | High | High | High | 3.6.1 | |
CVE-2019-10086 | Oracle Agile Engineering Data Management | Installation Issues (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed | Low | Low | Low | 6.2.1.0 | |
CVE-2019-10086 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed | Low | Low | Low | 3.6.1 | |
CVE-2021-44832 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed | High | High | High | 3.6.1 | |
CVE-2022-23437 | Oracle Agile Engineering Data Management | Installation Issues (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 6.2.1.0 | |
CVE-2022-23437 | Oracle Agile PLM | Security (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 9.3.6 | |
CVE-2022-23437 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed | None | None | High | 3.6.1 | |
CVE-2020-11022 | Oracle Agile PLM | Security (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.3.6 | |
CVE-2021-41184 | Oracle Agile PLM | Security (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.3.6 | |
CVE-2021-36374 | Oracle Agile Engineering Data Management | Installation Issues (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed | None | None | High | 6.2.1.0 | |
CVE-2020-17521 | Oracle Agile Engineering Data Management | Installation Issues (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed | High | None | None | 6.2.1.0 | |
CVE-2021-36374 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed | None | None | High | 3.6.1 | |
CVE-2021-34429 | Oracle Autovue for Agile Product Lifecycle Management | Internal Operations (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed | Low | None | None | 21.0.2 | |
CVE-2021-29425 | Oracle Agile Engineering Data Management | Installation Issues (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed | Low | Low | None | 6.2.1.0 |
This Critical Patch Update contains 7 new security patches for Oracle Systems. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-21513 | Oracle ZFS Storage Appliance Kit | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | 8.8 | |
CVE-2022-24801 | Oracle ZFS Storage Appliance Kit | Operating System Image | Multiple | Yes | 8.1 | Network | High | None | None | Un- changed | High | High | High | 8.8 | |
CVE-2022-21524 | Oracle Solaris | Filesystem | SMB | No | 7.6 | Network | Low | Low | None | Un- changed | Low | Low | High | 11 | |
CVE-2022-21514 | Oracle Solaris | Remote Administration Daemon | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 11 | |
CVE-2022-21533 | Oracle Solaris | SMB Server | None | No | 5.5 | Local | Low | Low | None | Un- changed | None | None | High | 11 | |
CVE-2022-21439 | Oracle Solaris | Kernel | None | No | 4.2 | Local | Low | High | Required | Un- changed | None | None | High | 10, 11 | |
CVE-2022-21563 | Oracle ZFS Storage Appliance Kit | Core | None | No | 3.4 | Local | Low | High | None | Un- changed | None | Low | Low | 8.8 |
This Critical Patch Update contains 1 new security patch for Oracle Utilities Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2020-36518 | Oracle Utilities Framework | General (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed | None | None | High | 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.5.0.0.0 |
This Critical Patch Update contains 2 new security patches for Oracle Virtualization. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? | CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score | Attack Vector | Attack Complex | Privs Req'd | User Interact | Scope | Confid- entiality | Inte- grity | Avail- ability | |||||||
CVE-2022-21571 | Oracle VM VirtualBox | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | Prior to 6.1.36 | |
CVE-2022-21554 | Oracle VM VirtualBox | Core | None | No | 4.4 | Local | Low | High | None | Un- changed | None | None | High | Prior to 6.1.36 |