A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Please refer to:
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 399 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at April 2020 Critical Patch Update: Executive Summary and Analysis.
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is a unique identifier for a vulnerability. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.
Security vulnerabilities are scored using CVSS version 3.0 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.0).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update Advisory, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program.:
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:
Date | Note |
---|---|
2020-July-20 | Rev 11. Credit Statement Update. |
2020-June-19 | Rev 10. Credit Statement Update. |
2020-June-15 | Rev 9. Added note concerning the patch for CVE-2020-2801. |
2020-May-27 | Rev 8. Credit Statement Update. |
2020-May-18 | Rev 7. Updated protocol information for CVE-2020-2798, CVE-2020-2801, CVE-2020-2828, CVE-2020-2883, CVE-2020-2884 and CVE-2020-2915. |
2020-May-06 | Rev 6. Credit Statement Update. |
2020-April-30 | Rev 5. Credit Statement Update. |
2020-April-24 | Rev 4. Added CVE-2020-2575 for VirtualBox to the Virtualization Risk Matrix. This increases the overall number of security patches to 399. The releases listed in the patch availability document for Virtualization already include the patch for CVE-2020-2575. Updated CVSS score for CVE-2020-2894 in the Oracle Virtualization risk matrix. Modified the additional CVE list for CVE-2018-1165 in Oracle ZFS Storage Appliance Kit. |
2020-April-17 | Rev 3. Modified the affected versions for Oracle Outside In Technology vulnerabilities and updated the credit statement. |
2020-April-16 | Rev 2. Added entry in the Oracle Fusion Middleware risk matrix for Oracle WebLogic Server security patch to address CVE-2019-16943. This increases the overall number of security patches to 398. This is simply a documentation change. The patches were already listed in the patch availability document for Fusion Middleware. |
2020-April-14 | Rev 1. Initial Release. |
This Critical Patch Update contains 10 new security patches for the Oracle Database Products divided as follows:
This Critical Patch Update contains 8 new security patches for the Oracle Database Server. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
CVE# | Component | Package and/or Privilege Required | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2735 | Java VM | Create Session | Oracle Net | No | 8.0 | Network | High | Low | Required | Changed | High | High | High | 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c | |
CVE-2016-10251 | Oracle Multimedia | Create Session | Oracle Net | No | 8.0 | Network | Low | Low | Required | Un- changed |
High | High | High | 12.1.0.2 | |
CVE-2019-17563 | WLM (Apache Tomcat) | None | HTTPS | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 12.2.0.1, 18c, 19c | |
CVE-2020-2737 | Core RDBMS | Create Session, Execute Catalog Role | Oracle Net | No | 6.4 | Network | High | High | Required | Un- changed |
High | High | High | 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c | |
CVE-2019-2853 | Oracle Text | Create Session | OracleNet | No | 6.3 | Network | Low | Low | None | Un- changed |
Low | Low | Low | 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c | |
CVE-2016-7103 | Oracle Application Express | None | HTTPS | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 19.1 | |
CVE-2020-2514 | Oracle Application Express | End User Role | HTTPS | No | 4.6 | Network | Low | Low | Required | Un- changed |
None | Low | Low | Prior to 19.2 | |
CVE-2020-2734 | RDBMS/Optimizer | Execute on DBMS_SQLTUNE | Oracle Net | No | 2.4 | Network | Low | High | Required | Un- changed |
Low | None | None | 12.1.0.2, 12.2.0.1, 18c, 19c |
This Critical Patch Update contains 1 new security patch for Oracle Global Lifecycle Management. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-20330 | Oracle Global Lifecycle Management OPatch | Patch Installer | HTTP | No | 0.0 | Network | High | None | None | Un- changed |
None | None | None | Prior to 11.2.0.3.23, Prior to 12.2.0.1.19, Prior to 13.9.4.2.1 | See Note 1 |
This Critical Patch Update contains 1 new security patch for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2018-5712 | Oracle Secure Backup | PHP | HTTPS | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 18.1 |
This Critical Patch Update contains 39 new security patches for Oracle Communications Applications. 35 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-16943 | Oracle Communications Calendar Server | Administration (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0.2.0, 8.0.0.3.0 | |
CVE-2015-3253 | Oracle Communications Converged Application Server - Service Controller | Admin Console (Groovy) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 6.1 | |
CVE-2016-4000 | Oracle Communications Diameter Signaling Router (DSR) | IDIH Visualization (Jython) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.2.0, 8.2.1 | |
CVE-2019-2729 | Oracle Communications Diameter Signaling Router (DSR) | IDIH Visualization (Oracle WebLogic Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.2.0, 8.2.1 | |
CVE-2019-14379 | Oracle Communications Diameter Signaling Router (DSR) | IDIH Visualization (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.2.0, 8.2.1 | |
CVE-2019-16943 | Oracle Communications Evolved Communications Application Server | SDP, SCF and URD (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 7.1 | |
CVE-2019-5482 | Oracle Communications Operations Monitor | REST API (cURL) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 3.4.0, 4.0.0, 4.1.0, 4.2.0, 4.3.0 | |
CVE-2019-2904 | Oracle Communications Service Broker | Admin Console (Application Development Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 6.0, 6.1 | |
CVE-2019-2904 | Oracle Communications Services Gatekeeper | API Management Portal (Application Development Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 6.0, 6.1 | |
CVE-2019-10082 | Oracle Communications Element Manager | Core (Apache HTTP Server) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-10088 | Oracle Communications Messaging Server | Security (Tika) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 8.0.2, 8.1.0 | |
CVE-2018-8039 | Oracle Communications Session Report Manager | Core (Apache CXF) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2018-8039 | Oracle Communications Session Route Manager | Core (Apache CXF) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.1.1 | |
CVE-2019-0211 | Oracle Communications Session Report Manager | Core (Apache HTTP Server) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-0211 | Oracle Communications Session Route Manager | Core (Apache HTTP Server) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-0227 | Oracle Communications ASAP Cartridges | Web Service (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 7.2, 7.3 | |
CVE-2019-0222 | Oracle Communications Diameter Signaling Router (DSR) | IDIH Visualization (Apache ActiveMQ) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0, 8.1.0, 8.2.0, 8.2.1 | |
CVE-2017-12626 | Oracle Communications Diameter Signaling Router (DSR) | IDIH Visualization (Apache POI) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0, 8.1.0, 8.2.0, 8.2.1 | |
CVE-2018-15756 | Oracle Communications Diameter Signaling Router (DSR) | IDIH Visualization (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0, 8.1.0, 8.2.0, 8.2.1 | |
CVE-2018-1000180 | Oracle Communications Diameter Signaling Router (DSR) | IDIH Visualization (Bouncy Castle Java Library) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.0, 8.1.0, 8.2.0, 8.2.1 | |
CVE-2019-0227 | Oracle Communications Element Manager | Core (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-10072 | Oracle Communications Element Manager | Core (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-15163 | Oracle Communications Operations Monitor | Packet Inspector, Traces functionality (libpcap) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 3.4.0, 4.0.0, 4.1.0, 4.2.0, 4.3.0 | |
CVE-2019-0227 | Oracle Communications Session Report Manager | Core (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-10072 | Oracle Communications Session Report Manager | Core (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2018-15756 | Oracle Communications Session Report Manager | Core (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0, 8.1.0, 8.1.1 | |
CVE-2019-0227 | Oracle Communications Session Route Manager | Core (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-10072 | Oracle Communications Session Route Manager | Core (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2018-15756 | Oracle Communications Session Route Manager | Core (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0, 8.1.0, 8.1.1 | |
CVE-2017-12626 | Oracle Communications Unified Inventory Management | Bulk Import (Apache POI) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 7.3.0, 7.4.0 | |
CVE-2019-11358 | Oracle Communications Diameter Signaling Router (DSR) | IDIH Visualization (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.0.0, 8.1.0, 8.2.0, 8.2.1 | |
CVE-2019-11358 | Oracle Communications Operations Monitor | Mediation Engine, Calls Page (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 3.4.0, 4.0.0, 4.1.0 | |
CVE-2019-11358 | Oracle Communications WebRTC Session Controller | WSC-Console (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 7.2 | |
CVE-2019-10247 | Oracle Communications Element Manager | Core (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2018-20852 | Oracle Communications Operations Monitor | VSP Webserver (Python) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 3.4.0, 4.0.0, 4.1.0, 4.2.0, 4.3.0 | |
CVE-2019-10247 | Oracle Communications Session Report Manager | Core (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-10247 | Oracle Communications Session Route Manager | Core (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.0.0, 8.1.0, 8.1.1, 8.2.0 | |
CVE-2019-14821 | Oracle SD-WAN Edge | OS (Kernel) | None | No | 3.9 | Local | High | High | None | Un- changed |
Low | Low | Low | 7.3, 8.0, 8.1, 8.2 | See Note 1 |
CVE-2019-1010238 | Oracle SD-WAN Edge | OS (Kernel) | SSH | No | 2.0 | Network | High | High | Required | Un- changed |
None | None | Low | 7.3, 8.0, 8.1, 8.2 | See Note 1 |
This Critical Patch Update contains 12 new security patches for Oracle Construction and Engineering. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2017-5645 | Instantis EnterpriseTrack | Logging (Log4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 17.1 - 17.3 | |
CVE-2019-17195 | Primavera Gateway | Admin (Connect2id Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 19.12.0 | |
CVE-2019-16943 | Primavera Gateway | Admin (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 17.12.0 - 17.12.6, 18.8.0 - 18.8.8, 19.12.0 | |
CVE-2019-16943 | Primavera Unifier | Infrastructure (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 16.1, 16.2, 17.7 - 17.12, 18.8, 19.12 | |
CVE-2019-13990 | Primavera Unifier | Infrastructure (Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 16.1, 16.2, 17.7 - 17.12, 18.8 | |
CVE-2019-10082 | Instantis EnterpriseTrack | Generic (Apache HTTP Server) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 17.1 - 17.3 | |
CVE-2019-17563 | Instantis EnterpriseTrack | Generic (Apache Tomcat) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 17.1 - 17.3 | |
CVE-2019-12402 | Primavera Gateway | Admin (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 18.8.0 - 18.8.8, 19.12.0 | |
CVE-2019-10086 | Primavera Gateway | Admin (Apache Commons Beanutils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 16.2.0 - 16.2.11, 17.12.0 - 17.12.6 | |
CVE-2020-2594 | Primavera P6 Enterprise Project Portfolio Management | Project Manager | HTTP | No | 6.5 | Network | Low | Low | Required | Changed | Low | Low | Low | 16.2.0.0 - 16.2.19.3, 17.12.0.0 - 17.12.17.0, 18.8.0.0 - 18.8.18.0, 19.12.1.0 - 19.12.3.0, 20.1.0.0 - 20.2.0.0 | |
CVE-2019-12415 | Instantis EnterpriseTrack | Office Open document processor (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 17.1 - 17.3 | |
CVE-2020-2706 | Primavera P6 Enterprise Project Portfolio Management | Project Manager | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 16.2.0.0 - 16.2.19.3, 17.12.0.0 - 17.12.17.0, 18.8.0.0 - 18.8.18.0, 19.12.1.0 - 19.12.3.0, 20.1.0.0 - 20.2.0.0 |
This Critical Patch Update contains 74 new security patches for the Oracle E-Business Suite. 70 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2020 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (April 2020), My Oracle Support Note 2650675.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2838 | Oracle CRM Gateway for Mobile Devices | Setup of Mobile Applications | HTTP | Yes | 8.6 | Network | Low | None | None | Changed | High | None | None | 12.1.1-12.1.3 | |
CVE-2020-2863 | Oracle Advanced Outbound Telephony | User Interface | HTTP | No | 8.5 | Network | Low | Low | None | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2852 | Oracle Advanced Outbound Telephony | Calendar | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2871 | Oracle Advanced Outbound Telephony | User Interface | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2854 | Oracle Advanced Outbound Telephony | User Interface | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2856 | Oracle Advanced Outbound Telephony | User Interface | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2857 | Oracle Advanced Outbound Telephony | User Interface | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2890 | Oracle Applications Framework | Diagnostics | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2820 | Oracle Common Applications Calendar | Notes | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.8 | |
CVE-2020-2823 | Oracle Common Applications Calendar | Notes | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2881 | Oracle CRM Technical Foundation | Preferences | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2873 | Oracle Customer Interaction History | Outcome-Result | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2842 | Oracle Depot Repair | Estimate and Actual Charges | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2844 | Oracle Depot Repair | Estimate and Actual Charges | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2845 | Oracle Depot Repair | Estimate and Actual Charges | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2846 | Oracle Depot Repair | Estimate and Actual Charges | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2847 | Oracle Depot Repair | Estimate and Actual Charges | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2848 | Oracle Depot Repair | Estimate and Actual Charges | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2849 | Oracle Depot Repair | Estimate and Actual Charges | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2850 | Oracle Depot Repair | Estimate and Actual Charges | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2885 | Oracle Document Management and Collaboration | Attachments | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3,12.2.3-12.2.9 | |
CVE-2020-2808 | Oracle E-Business Intelligence | DBI Setups | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2809 | Oracle E-Business Intelligence | DBI Setups | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2840 | Oracle E-Business Intelligence | DBI Setups | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2874 | Oracle Email Center | Customer Search | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2794 | Oracle Email Center | Email Address list and Message Display | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2813 | Oracle Email Center | KB Search | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2796 | Oracle Email Center | Message Display | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2855 | Oracle iSupport | Admin | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2878 | Oracle iSupport | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | ||
CVE-2020-2843 | Oracle iSupport | Profile | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2815 | Oracle iSupport | Profile | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2872 | Oracle iSupport | Profile | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2841 | Oracle Knowledge Management | Setup, Admin | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2880 | Oracle Learning Management | OTA Training Activities | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2831 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2834 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2835 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2836 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2837 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2858 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2860 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2861 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2876 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2807 | Oracle Marketing Encyclopedia System | Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2824 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2825 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2826 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2827 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2832 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2870 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2877 | Oracle Partner Management | Attribute Admin Setup | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2833 | Oracle Quoting | Courseware | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2817 | Oracle Scripting | Miscellaneous | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2879 | Oracle Scripting | Miscellaneous | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2839 | Oracle Service Intelligence | Internal Operations- Search | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2821 | Oracle Trade Management | Budget | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.8 | |
CVE-2020-2822 | Oracle Trade Management | Claims | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2818 | Oracle Universal Work Queue | Work Provider Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2819 | Oracle Universal Work Queue | Work Provider Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2020-2882 | Oracle Human Resources | Hierarchy Diagrammers | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2956 | Oracle Human Resources | Hierarchy Diagrammers | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2750 | Oracle General Ledger | Account Hierarchy Manager | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2866 | Oracle Applications Framework | Attachments / File Upload | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.2.5-12.2.9 | |
CVE-2020-2889 | Oracle CRM Technical Foundation | Preferences | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.1.3,12.2.3-12.2.9 | |
CVE-2020-2887 | Oracle Customer Interaction History | Outcome-Result | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.1.1-12.1.3,12.2.3-12.2.9 | |
CVE-2020-2864 | Oracle iSupplier Portal | Accounts | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.1.3, 12.2.5-12.2.9 | |
CVE-2020-2888 | Oracle Marketing | Partners | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2753 | Oracle Workflow | Workflow Notification Mailer | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2886 | Oracle CRM Technical Foundation | Preferences | HTTP | Yes | 4.7 | Network | Low | None | Required | Changed | None | Low | None | 12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2810 | Oracle iStore | Shopping Cart | HTTP | Yes | 4.7 | Network | Low | None | Required | Changed | None | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2789 | Oracle iSupport | User Interface | HTTP | Yes | 4.7 | Network | Low | None | Required | Changed | None | Low | None | 12.1.1-12.1.3,12.2.3-12.2.8 | |
CVE-2020-2862 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 4.7 | Network | Low | None | Required | Changed | Low | None | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2020-2772 | Oracle Human Resources | Absence Recording, Maintenance | HTTP | No | 4.1 | Network | Low | Low | Required | Changed | None | Low | None | 12.2.6-12.2.9 |
This Critical Patch Update contains 7 new security patches for Oracle Enterprise Manager. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the April 2020 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2020 Patch Availability Document for Oracle Products, My Oracle Support Note 2633852.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2961 | Enterprise Manager Base Platform | Discovery Framework (Oracle OHS) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.2.0.0, 13.3.0.0 | |
CVE-2018-11058 | Oracle Real User Experience Insight | Processing (Oracle Instant Client) | Multiple | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 13.1.2.1, 13.2.3.1, 13.3.1.0 | |
CVE-2018-18311 | Enterprise Manager Base Platform | Install (Perl) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 13.2.0.0, 13.3.0.0 | |
CVE-2019-0227 | Oracle Application Testing Suite | Oracle Flow Builder (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 13.2.0.1, 13.3.0.1 | |
CVE-2019-1543 | Enterprise Manager Base Platform | Discovery Framework (OpenSSL) | HTTPS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 12.1.0.5, 13.2.0.0, 13.3.0.0 | |
CVE-2019-11358 | Application Service Level Management | Service Level Agreements (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 13.2.0.0, 13.3.0.0 | |
CVE-2020-2946 | Application Performance Management | EM Request Monitoring | HTTP | No | 6.0 | Network | Low | High | None | Un- changed |
High | Low | Low | 12.1.0.5, 13.2.0.0, 13.3.0.0 |
This Critical Patch Update contains 35 new security patches for Oracle Financial Services Applications. 16 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-2904 | Oracle Banking Enterprise Collections | Framework (Application Development Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.7.0, 2.8.0 | |
CVE-2019-13990 | Oracle Banking Enterprise Originations | Core (Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.7.0, 2.8.0 | |
CVE-2019-2904 | Oracle Banking Enterprise Originations | Framework (Application Development Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.7.0, 2.8.0 | |
CVE-2019-13990 | Oracle Banking Enterprise Product Manufacturing | Core (Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.7.0, 2.8.0 | |
CVE-2019-2904 | Oracle Banking Enterprise Product Manufacturing | Framework (Application Development Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.7.0, 2.8.0 | |
CVE-2019-2904 | Oracle Banking Platform | Framework (Application Development Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, 2.9.0 | |
CVE-2019-16943 | Oracle Banking Platform | Framework (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, 2.9.0 | |
CVE-2019-2904 | Oracle Financial Services Revenue Management and Billing Analytics | Dashboards (Application Development Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.6, 2.7, 2.8 | |
CVE-2019-12419 | Oracle FLEXCUBE Private Banking | Core (Apache CXF) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0, 12.1 | |
CVE-2019-2904 | Oracle FLEXCUBE Private Banking | Framework (Application Development Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0, 12.1 | |
CVE-2019-10088 | Oracle FLEXCUBE Private Banking | Core (Apache Tika) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 12.0, 12.1 | |
CVE-2019-17359 | Oracle Financial Services Analytical Applications Infrastructure | Infrastructure (Bouncy Castle Java Library) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.6 - 8.0.9 | |
CVE-2019-0227 | Oracle FLEXCUBE Private Banking | Core (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 12.0, 12.1 | |
CVE-2017-12626 | Oracle FLEXCUBE Private Banking | Core (Apache POI) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.0, 12.1 | |
CVE-2020-2793 | Oracle Financial Services Analytical Applications Infrastructure | Infrastructure | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6 - 8.0.9 | |
CVE-2020-2939 | Oracle Financial Services Asset Liability Management | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6, 8.0.7 | |
CVE-2020-2936 | Oracle Financial Services Balance Sheet Planning | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.8 | |
CVE-2020-2964 | Oracle Financial Services Data Foundation | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6 - 8.0.9 | |
CVE-2020-2945 | Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management | User Interfaces | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.7, 8.0.8 | |
CVE-2020-2941 | Oracle Financial Services Funds Transfer Pricing | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6, 8.0.7 | |
CVE-2020-2935 | Oracle Financial Services Hedge Management and IFRS Valuations | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6 - 8.0.8 | |
CVE-2020-2891 | Oracle Financial Services Liquidity Risk Management | User Interfaces | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6 | |
CVE-2020-2943 | Oracle Financial Services Liquidity Risk Measurement and Management | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.7, 8.0.8 | |
CVE-2020-2938 | Oracle Financial Services Loan Loss Forecasting and Provisioning | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6 - 8.0.8 | |
CVE-2020-2942 | Oracle Financial Services Price Creation and Discovery | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.7 | |
CVE-2020-2940 | Oracle Financial Services Profitability Management | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6, 8.0.7 | |
CVE-2020-2937 | Oracle Insurance Accounting Analyzer | User Interface | HTTP | No | 7.1 | Network | Low | Low | None | Un- changed |
Low | High | None | 8.0.6 - 8.0.9 | |
CVE-2020-2955 | Oracle FLEXCUBE Core Banking | Transaction Processing | HTTP | No | 6.3 | Network | Low | Low | None | Un- changed |
Low | Low | Low | 4.0 | |
CVE-2019-17091 | Oracle Banking Enterprise Product Manufacturing | Core (Eclipse Mojarra) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 2.7.0, 2.8.0 | |
CVE-2019-12415 | Oracle Banking Enterprise Originations | Core (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 2.7.0, 2.8.0 | |
CVE-2019-12415 | Oracle Banking Enterprise Product Manufacturing | Core (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 2.7.0, 2.8.0 | |
CVE-2019-12415 | Oracle Banking Platform | Core (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, 2.9.0 | |
CVE-2019-12415 | Oracle Financial Services Analytical Applications Infrastructure | Infrastructure (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 8.0.6 - 8.0.9 | |
CVE-2019-12415 | Oracle Financial Services Market Risk Measurement and Management | Infrastructure (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 8.0.6, 8.0.8 | |
CVE-2019-10247 | Oracle FLEXCUBE Private Banking | Core (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.0, 12.1 |
This Critical Patch Update contains 1 new security patch for Oracle Food and Beverage Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Component | Package and/or Privilege Required | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2746 | Oracle Hospitality Reporting and Analytics | Admin | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 9.1.0 |
This Critical Patch Update contains 52 new security patches for Oracle Fusion Middleware. 45 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update April 2020 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2020 Patch Availability Document for Oracle Products, My Oracle Support Note 2633852.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2950 | Oracle Business Intelligence Enterprise Edition | Analytics Web General | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2016-1000031 | Oracle Business Intelligence Enterprise Edition | BI Platform Security (Apache Commons FileUpload) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-2915 | Oracle Coherence | Caching, CacheStore, Invocation | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-13990 | Oracle Fusion Middleware MapViewer | Install (Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0 | |
CVE-2019-16943 | Oracle Global Lifecycle Management NextGen OUI Framework | Tools (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.9.4.2.2, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2016-10328 | Oracle Outside In Technology | Installation (FreeType) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.5.4 | See Note 1 |
CVE-2019-16943 | Oracle WebCenter Portal | Security Framework (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-16943 | Oracle WebCenter Sites | Sites (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-17571 | Oracle WebLogic Server | Console (Apache Log4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 | |
CVE-2019-16943 | Oracle WebLogic Server | Third Party Tools (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-2801 | Oracle WebLogic Server | Core | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | See Note 2 |
CVE-2020-2883 | Oracle WebLogic Server | Core | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-2884 | Oracle WebLogic Server | Core | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-10088 | Oracle Business Process Management Suite | BPM Composer (Apache Tika) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 12.2.1.4.0 | |
CVE-2017-5130 | Oracle HTTP Server | Web Listener (LibXML2) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 11.1.1.9.0 | |
CVE-2020-2867 | Oracle WebLogic Server | Web Container | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed |
Low | High | None | 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-0222 | Identity Manager Connector | General (Apache ActiveMQ) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 9.0 | |
CVE-2018-15756 | Identity Manager Connector | LDAP Gateway (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 9.0 | |
CVE-2015-7940 | Oracle Business Intelligence Enterprise Edition | Installation (Bouncy Castle Java Library) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2017-12626 | Oracle Endeca Information Discovery Integrator | Integrator ETL (Apache POI) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 3.2.0 | |
CVE-2019-17359 | Oracle Managed File Transfer | MFT Runtime Server (Bouncy Castle Java Library) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-15903 | Oracle Outside In Technology | DC-Specific Component (LibExpat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.4 | See Note 1 |
CVE-2019-16168 | Oracle Outside In Technology | DC-Specific Component (SQLite) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.4 | See Note 1 |
CVE-2018-20843 | Oracle Outside In Technology | Installation (FreeType) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.4 | See Note 1 |
CVE-2019-17359 | Oracle SOA Suite | Installation (Bouncy Castle Java Library) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-17359 | Oracle WebCenter Portal | Security Framework (Bouncy Castle Java Library) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-2828 | Oracle WebLogic Server | WLS Web Services | IIOP, T3 | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 10.3.6.0.0 | |
CVE-2020-2739 | Oracle WebCenter Sites | Advanced UI | HTTP | Yes | 7.4 | Network | Low | None | Required | Changed | High | None | None | 12.2.1.3.0 | |
CVE-2020-2784 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.5.4 | See Note 1 |
CVE-2020-2785 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.5.4 | See Note 1 |
CVE-2020-2786 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.5.4 | See Note 1 |
CVE-2020-2787 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.5.4 | See Note 1 |
CVE-2020-2798 | Oracle WebLogic Server | WLS Web Services | IIOP, T3 | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-2952 | Oracle HTTP Server | Web Listener | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 11.1.1.9.0 | |
CVE-2018-20622 | Oracle Outside In Technology | Installation (JasPer) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 8.5.4 | See Note 1 |
CVE-2019-11358 | Oracle Big Data Discovery | Studio (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 1.6 | |
CVE-2019-11358 | Oracle Fusion Middleware MapViewer | Install (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0 | |
CVE-2019-11358 | Oracle WebCenter Sites | Advanced UI (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0 | |
CVE-2020-2811 | Oracle WebLogic Server | Console | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-12415 | Oracle Big Data Discovery | Studio (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 1.6 | |
CVE-2020-2747 | Oracle Access Manager | SSO Engine | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 11.1.2.3.0, 12.2.1.3.0 | |
CVE-2020-2949 | Oracle Coherence | Caching, CacheStore, Invocation | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-10247 | Oracle Endeca Information Discovery Integrator | Integrator ETL (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 3.2.0 | |
CVE-2020-2783 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.5.4 | See Note 1 |
CVE-2019-10247 | Oracle Unified Directory | OpenDS SDK (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-2766 | Oracle WebLogic Server | Console | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-2829 | Oracle WebLogic Server | Management Services | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
High | None | None | 10.3.6.0.0 | |
CVE-2019-1547 | Oracle API Gateway | Oracle API Gateway (OpenSSL) | None | No | 4.7 | Local | High | Low | None | Un- changed |
High | None | None | 11.1.2.4.0 | |
CVE-2019-1547 | Oracle Endeca Server | Product Code (OpenSSL) | None | No | 4.7 | Local | High | Low | None | Un- changed |
High | None | None | 7.7.0 | |
CVE-2020-2740 | Oracle Access Manager | Authentication Engine | HTTP | No | 4.6 | Network | Low | Low | Required | Un- changed |
Low | Low | None | 11.1.2.3.0, 12.2.1.3.0 | |
CVE-2020-2745 | Oracle Access Manager | Federation | HTTP | Yes | 4.3 | Network | Low | None | Required | Un- changed |
None | None | Low | 11.1.2.3.0, 12.2.1.3.0 | |
CVE-2020-2869 | Oracle WebLogic Server | Console | HTTP | Yes | 4.3 | Network | Low | None | Required | Un- changed |
None | Low | None | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 |
This Critical Patch Update contains 5 new security patches for Oracle GraalVM. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-15606 | Oracle GraalVM Enterprise Edition | JavaScript (Node.js) | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 19.3.1, 20.0.0 | |
CVE-2020-2803 | Oracle GraalVM Enterprise Edition | Java | Multiple | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 19.3.1, 20.0.0 | |
CVE-2020-2802 | Oracle GraalVM Enterprise Edition | GraalVM Compiler | Multiple | No | 7.7 | Network | Low | Low | None | Changed | None | None | High | 19.3.1, 20.0.0 | |
CVE-2020-2799 | Oracle GraalVM Enterprise Edition | GraalVM Compiler | Multiple | No | 6.3 | Network | High | Low | None | Changed | None | High | None | 19.3.1, 20.0.0 | |
CVE-2020-2900 | Oracle GraalVM Enterprise Edition | Tools | Multiple | No | 3.7 | Network | High | Low | Required | Un- changed |
Low | Low | None | 19.3.1, 20.0.0 |
This Critical Patch Update contains 2 new security patches for Oracle Health Sciences Applications. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-17091 | Oracle Health Sciences Information Manager | Policy Engine (Eclipse Mojarra) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 3.0 | |
CVE-2019-17091 | Oracle Healthcare Data Repository | Installation (Eclipse Mojarra) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 7.0 |
This Critical Patch Update contains 3 new security patches for Oracle Hyperion. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2777 | Hyperion Financial Management | Security | HTTP | No | 4.2 | Network | High | High | Required | Un- changed |
None | High | None | 11.1.2.4 | |
CVE-2019-2899 | Hyperion Financial Management | Security (Application Development Framework) | HTTP | No | 2.4 | Network | Low | High | Required | Un- changed |
Low | None | None | 11.1.2.4 | |
CVE-2020-2769 | Hyperion Financial Reporting | Web Based Report Designer | HTTP | No | 2.4 | Network | Low | High | Required | Un- changed |
Low | None | None | 11.1.2.4 |
This Critical Patch Update contains 15 new security patches for Oracle Java SE. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2803 | Java SE, Java SE Embedded | Libraries | Multiple | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 1 |
CVE-2020-2805 | Java SE, Java SE Embedded | Libraries | Multiple | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 1 |
CVE-2019-18197 | Java SE | JavaFX (libxslt) | Multiple | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | Java SE: 8u241 | See Note 1 |
CVE-2020-2816 | Java SE | JSSE | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | Java SE: 11.0.6, 14 | See Note 2 |
CVE-2020-2781 | Java SE, Java SE Embedded | JSSE | HTTPS | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 3 |
CVE-2020-2830 | Java SE, Java SE Embedded | Concurrency | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 3 |
CVE-2020-2767 | Java SE | JSSE | HTTPS | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | Java SE: 11.0.6, 14 | See Note 3 |
CVE-2020-2800 | Java SE, Java SE Embedded | Lightweight HTTP Server | Multiple | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 2 |
CVE-2020-2778 | Java SE | JSSE | HTTPS | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | Java SE: 11.0.6, 14 | See Note 3 |
CVE-2020-2764 | Java SE | Advanced Management Console | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | Java Advanced Management Console: 2.16 | See Note 2 |
CVE-2020-2754 | Java SE, Java SE Embedded | Scripting | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | Java SE: 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 3 |
CVE-2020-2755 | Java SE, Java SE Embedded | Scripting | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | Java SE: 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 3 |
CVE-2020-2773 | Java SE, Java SE Embedded | Security | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 3 |
CVE-2020-2756 | Java SE, Java SE Embedded | Serialization | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 3 |
CVE-2020-2757 | Java SE, Java SE Embedded | Serialization | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241 | See Note 3 |
This Critical Patch Update contains 4 new security patches for Oracle JD Edwards. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2733 | JD Edwards EnterpriseOne Tools | Monitoring and Diagnostics | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 9.2 | |
CVE-2018-11058 | JD Edwards EnterpriseOne Tools | Enterprise Infrastructure Security (Oracle Security Service) | JDENET | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 9.2 | |
CVE-2019-1547 | JD Edwards EnterpriseOne Tools | Enterprise Infrastructure Security (OpenSSL) | None | No | 4.7 | Local | High | Low | None | Un- changed |
High | None | None | 9.2 | |
CVE-2019-1547 | JD Edwards World Security | World Software Security (OpenSSL) | None | No | 4.7 | Local | High | Low | None | Un- changed |
High | None | None | A9.3, A9.3.1, A9.4 |
This Critical Patch Update contains 16 new security patches for Oracle Knowledge. 15 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2791 | Oracle Knowledge | Information Manager Console | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.6.0-8.6.2 | |
CVE-2016-1000031 | Oracle Knowledge | Information Manager Console, Web Applications - InfoCenter (Apache Commons FileUpload) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.6.0-8.6.3 | |
CVE-2020-2931 | Oracle Knowledge | Web Applications - InfoCenter | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.6.0-8.6.3 | |
CVE-2015-1832 | Oracle Knowledge | Web Applications - InfoCenter (Apache Derby) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 8.6.0-8.6.3 | |
CVE-2019-0227 | Oracle Knowledge | Information Manager Console (Apache Axis) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.6.0-8.6.3 | |
CVE-2016-3092 | Oracle Knowledge | Web Applications - InfoCenter (Apache Commons Fileupload) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.6.0-8.6.3 | |
CVE-2015-0254 | Oracle Knowledge | Information Manager Console (Apache Standard Taglibs) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.6.0-8.6.1 | |
CVE-2018-17197 | Oracle Knowledge | Information Manager Console (Apache Tika) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 8.6.0-8.6.3 | |
CVE-2020-2795 | Oracle Knowledge | Information Manager Console | None | No | 6.3 | Local | High | High | Required | Un- changed |
High | High | High | 8.6.0-8.6.2 | |
CVE-2019-11358 | Oracle Knowledge | Answer Flow (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.6.0-8.6.3 | |
CVE-2015-9251 | Oracle Knowledge | Information Manager Console, Web Applications - InfoCenter (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.6.0-8.6.3 | |
CVE-2017-14735 | Oracle Knowledge | Web Applications - InfoCenter (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.6.0-8.6.3 | |
CVE-2020-2524 | Oracle Knowledge | InQuira Search | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 8.6.0-8.6.3 | |
CVE-2020-2932 | Oracle Knowledge | Information Manager Console | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 8.6.0-8.6.3 | |
CVE-2020-2553 | Oracle Knowledge | Information Manager Console | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 8.6.0-8.6.3 | |
CVE-2020-2522 | Oracle Knowledge | Information Manager Console | HTTP | Yes | 4.3 | Network | Low | None | Required | Un- changed |
None | Low | None | 8.6.0-8.6.1 |
This Critical Patch Update contains 45 new security patches for Oracle MySQL. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-5482 | MySQL Server | Server: Compiling (cURL) | MySQL Protocol | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 5.7.28 and prior, 8.0.18 and prior | |
CVE-2019-19646 | MySQL Workbench | MySQL Workbench (SQLite) | MySQL Workbench | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.19 and prior | |
CVE-2019-14889 | MySQL Workbench | MySQL Workbench (libssh) | MySQL Workbench | No | 8.0 | Network | Low | Low | Required | Un- changed |
High | High | High | 8.0.19 and prior | |
CVE-2019-17563 | MySQL Enterprise Monitor | Service Manager (Apache Tomcat) | HTTPS | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 8.0.18.1217 and prior, 4.0.11.5331 and prior | |
CVE-2019-15601 | MySQL Server | Server: Compiling (cURL) | MySQL Protocol | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 5.7.29 and prior, 8.0.19 and prior | |
CVE-2019-15601 | MySQL Workbench | MySQL Workbench (cURL) | MySQL Workbench | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.19 and prior | |
CVE-2020-2780 | MySQL Server | Server: DML | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior | |
CVE-2020-2790 | MySQL Server | Server: Pluggable Auth | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 5.7.28 and prior | |
CVE-2020-2768 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Network | Low | Low | Required | Un- changed |
None | Low | High | 7.3.28 and prior, 7.4.27 and prior, 7.5.17 and prior, 7.6.13 and prior, 8.0.19 and prior | |
CVE-2020-2804 | MySQL Server | Server: Memcached | Memcached Protocol | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior | |
CVE-2020-2760 | MySQL Server | InnoDB | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed |
None | Low | High | 5.7.29 and prior, 8.0.19 and prior | |
CVE-2020-2752 | MySQL Client | C API | MySQL Protocol | No | 5.3 | Network | High | Low | None | Un- changed |
None | None | High | 5.6.47 and prior, 5.7.27 and prior, 8.0.17 and prior | |
CVE-2020-2806 | MySQL Server | Server: Compiling | MySQL Protocol | No | 5.3 | Network | High | Low | None | Un- changed |
None | None | High | 5.7.28 and prior | |
CVE-2020-2934 | MySQL Connectors | Connector/J | MySQL Protocol | Yes | 5.0 | Network | High | None | Required | Un- changed |
Low | Low | Low | 8.0.19 and prior, 5.1.48 and prior | |
CVE-2020-2762 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2814 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.6.47 and prior, 5.7.28 and prior, 8.0.18 and prior | |
CVE-2020-2893 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2895 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2898 | MySQL Server | Server: Charsets | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 | |
CVE-2020-2903 | MySQL Server | Server: Connection Handling | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2896 | MySQL Server | Server: Information Schema | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2770 | MySQL Server | Server: Logging | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.18 and prior | |
CVE-2020-2765 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.7.29 and prior, 8.0.19 and prior | |
CVE-2020-2892 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2897 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2923 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2924 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2901 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2928 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2904 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2925 | MySQL Server | Server: PS | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2759 | MySQL Server | Server: Replication | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2763 | MySQL Server | Server: Replication | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior | |
CVE-2020-2761 | MySQL Server | Server: Security: Privileges | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.18 and prior | |
CVE-2020-2774 | MySQL Server | Server: Security: Privileges | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.18 and prior | |
CVE-2020-2853 | MySQL Server | Server: Security: Privileges | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.18 and prior | |
CVE-2020-2779 | MySQL Server | Server: Security: Privileges | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.18 and prior | |
CVE-2020-2812 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior | |
CVE-2020-2875 | MySQL Connectors | Connector/J | MySQL Protocol | Yes | 4.7 | Network | High | None | Required | Changed | Low | Low | None | 8.0.14 and prior, 5.1.48 and prior | |
CVE-2019-1547 | MySQL Server | Server: Packaging (OpenSSL) | MySQL Protocol | No | 4.7 | Local | High | Low | None | Un- changed |
High | None | None | 5.6.46 and prior, 5.7.26 and prior, 8.0.18 and prior | |
CVE-2020-2926 | MySQL Server | Server: Group Replication GCS | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2921 | MySQL Server | Server: Group Replication Plugin | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2930 | MySQL Server | Server: Parser | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2020-2922 | MySQL Client | C API | MySQL Protocol | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 5.6.47 and prior, 5.7.29 and prior, 8.0.18 and prior | |
CVE-2020-2933 | MySQL Connectors | Connector/J | MySQL Protocol | No | 2.2 | Network | High | High | None | Un- changed |
None | None | Low | 5.1.48 and prior |
This Critical Patch Update contains 14 new security patches for Oracle PeopleSoft. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2776 | PeopleSoft Enterprise PeopleTools | Security | HTTP | Yes | 8.6 | Network | Low | None | None | Changed | None | None | High | 8.56, 8.57 | |
CVE-2019-0227 | PeopleSoft Enterprise PeopleTools | Tools Admin API (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 8.56, 8.57, 8.58 | |
CVE-2020-2859 | PeopleSoft Enterprise PeopleTools | nVision | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.56, 8.57, 8.58 | |
CVE-2019-17359 | PeopleSoft Enterprise PeopleTools | Security (Bouncy Castle Java Library) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.56, 8.57, 8.58 | |
CVE-2020-2782 | PeopleSoft Enterprise PeopleTools | Query | HTTP | Yes | 7.1 | Network | Low | None | Required | Changed | Low | Low | Low | 8.56, 8.57, 8.58 | |
CVE-2020-2906 | PeopleSoft Enterprise SCM Purchasing | Supplier Change | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.2 | |
CVE-2020-2954 | PeopleSoft Enterprise HRMS | Candidate Gateway | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.2 | |
CVE-2020-2868 | PeopleSoft Enterprise PeopleTools | Diagnostic Framework | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.56, 8.57, 8.58 | |
CVE-2020-2751 | PeopleSoft Enterprise PeopleTools | Portal | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.56, 8.57 | |
CVE-2020-2797 | PeopleSoft Enterprise PeopleTools | Process Scheduler | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.56, 8.57, 8.58 | |
CVE-2020-2775 | PeopleSoft Enterprise PeopleTools | Portal | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.56, 8.57, 8.58 | |
CVE-2020-2912 | PeopleSoft Enterprise CS Campus Community | Self-Service | HTTP | No | 5.0 | Network | Low | Low | None | Changed | Low | None | None | 9.2 | |
CVE-2020-2899 | PeopleSoft Enterprise SCM Purchasing | Purchasing | HTTP | No | 4.8 | Network | Low | High | Required | Changed | Low | Low | None | 9.2 | |
CVE-2020-2947 | PeopleSoft Enterprise HCM Absence Management | Absence Management | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
None | Low | None | 9.2 |
This Critical Patch Update contains 27 new security patches for Oracle Retail Applications. 17 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2017-5645 | Oracle Retail Advanced Inventory Planning | AIP Dashboard (Apache Ant) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.0, 15.0 | |
CVE-2019-13990 | Oracle Retail Back Office | Security (Apache Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1 | |
CVE-2019-13990 | Oracle Retail Central Office | Security (Apache Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1 | |
CVE-2020-2953 | Oracle Retail Customer Management and Segmentation Foundation | Promotions | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 18.0 | |
CVE-2019-13990 | Oracle Retail Order Broker | Order Broker Foundation (Apache Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 15.0, 16.0, 18.0, 19.0 | |
CVE-2019-13990 | Oracle Retail Point-of-Service | Security (Apache Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1 | |
CVE-2018-11058 | Oracle Retail Predictive Application Server | RPAS Server (Oracle Security Service) | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 15.0.3, 16.0.3 | |
CVE-2019-13990 | Oracle Retail Returns Management | Security (Apache Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1 | |
CVE-2019-2880 | Oracle Retail Store Inventory Management | Security | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 16.0 | |
CVE-2019-17563 | MICROS Relate CRM Software | Segments (Apache Tomcat) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 11.4 | |
CVE-2019-17563 | Oracle Retail Order Broker | System Administration (Apache Tomcat) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 15.0 | |
CVE-2020-5398 | Oracle Retail Order Broker | System Administration (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 15.0, 16.0 | |
CVE-2017-5533 | Oracle Retail Xstore Point of Service | Point of Sale (JasperReports) | HTTP | No | 7.5 | Network | High | Low | None | Un- changed |
High | High | High | 15.0 | |
CVE-2019-0227 | Oracle Retail Xstore Point of Service | Xenvironment (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 7.1 | |
CVE-2019-17359 | Oracle Retail Xstore Point of Service | Xenvironment (Bouncy Castle Java Library) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 18.0.1 | |
CVE-2017-12626 | Oracle Retail Xstore Point of Service | Xenvironment (Apache POI) | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 7.1 | |
CVE-2019-17091 | Oracle Retail Advanced Inventory Planning | AIP Dashboard (Eclipse Mojarra) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 15.0, 16.0 | |
CVE-2019-17091 | Oracle Retail Merchandising System | Inventory Tracking (Eclipse Mojarra) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 16.0 | |
CVE-2018-10237 | Oracle Retail Xstore Point of Service | Xstore Office (Google Guava) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 7.1, 15.0, 16.0, 17.0 | |
CVE-2017-3160 | Oracle Retail Xstore Point of Service | Xstore Services (Apache Cordova) | None | No | 4.2 | Local | High | Low | Required | Un- changed |
Low | Low | Low | 15.0 | |
CVE-2019-10173 | Oracle Retail Xstore Point of Service | Point of Sale (xstream) | HTTP | No | 3.9 | Network | High | High | Required | Un- changed |
Low | Low | Low | 17.0 | |
CVE-2019-10086 | Oracle Retail Xstore Point of Service | Xenvironment (Apache Commons) | HTTP | No | 3.9 | Network | High | High | Required | Un- changed |
Low | Low | Low | 7.1, 15.0, 16.0, 17.0, 18.0 | |
CVE-2019-10072 | Oracle Retail Xstore Point of Service | Xstore Services (Apache Tomcat) | HTTP | No | 3.9 | Network | High | High | Required | Un- changed |
Low | Low | Low | 15.0, 16.0, 17.0, 18.0 | |
CVE-2018-1258 | Oracle Retail Xstore Point of Service | Xenvironment (jackson-databind) | HTTP | No | 3.7 | Network | High | Low | Required | Un- changed |
Low | None | Low | 17.0 | |
CVE-2019-10082 | Oracle Retail Xstore Point of Service | Xstore Office (Apache HTTP Server) | HTTP | No | 3.3 | Network | High | High | None | Un- changed |
Low | None | Low | 7.1 | |
CVE-2018-11797 | Oracle Retail Xstore Point of Service | Dataloader (Apache pdfbox) | HTTP | No | 3.1 | Network | High | High | Required | Un- changed |
Low | None | Low | 17.0 | |
CVE-2018-10237 | Oracle Retail Xstore Point of Service | Xstore Services (Google Guava) | HTTP | No | 3.1 | Network | High | High | Required | Un- changed |
Low | Low | None | 17.0 |
This Critical Patch Update contains 1 new security patch for Oracle Siebel CRM. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2738 | Siebel UI Framework | EAI, SWSE | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 20.2 and prior |
This Critical Patch Update contains 4 new security patches for Oracle Supply Chain. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2017-5645 | Oracle In-Memory Performance-Driven Planning | User Interface (Log4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.1, 12.2 | |
CVE-2020-2920 | Oracle Agile PLM | Security | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.3.3, 9.3.5, 9.3.6 | |
CVE-2020-2744 | Oracle Transportation Management | Security | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 6.3.7, 6.4.2, 6.4.3 | |
CVE-2020-2865 | Oracle Configurator | Installation | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.1, 12.2 |
This Critical Patch Update contains 2 new security patches for Oracle Support Tools. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-5482 | OSS Support Tools | Services Tools Bundle (cURL) | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 20.0 | |
CVE-2019-15601 | OSS Support Tools | Services Tools Bundle (cURL) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 20.1 |
This Critical Patch Update contains 9 new security patches for Oracle Systems. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-2729 | StorageTek Tape Analytics SW Tool | Application Server (Oracle WebLogic Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.3.0 | |
CVE-2020-2944 | Oracle Solaris | Common Desktop Environment | None | No | 8.8 | Local | Low | Low | None | Changed | High | High | High | 10, 11 | |
CVE-2020-2927 | Oracle Solaris | Common Desktop Environment | None | No | 7.8 | Local | High | Low | None | Changed | High | High | High | 10, 11 | |
CVE-2020-2851 | Oracle Solaris | Common Desktop Environment | None | No | 7.8 | Local | High | Low | None | Changed | High | High | High | 10, 11 | |
CVE-2018-1165 | Oracle Solaris | SMB Server Kernel Module | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | 11 | |
CVE-2018-1165 | Oracle ZFS Storage Appliance Kit | Operating System Image | Multiple | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | 8.8 | |
CVE-2019-11358 | StorageTek Tape Analytics SW Tool | Software (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 2.3.0 | |
CVE-2020-2749 | Oracle Solaris | SMF command svcbundle | None | No | 2.5 | Local | High | Low | Required | Changed | None | Low | None | 11 | |
CVE-2020-2771 | Oracle Solaris | Whodo | None | No | 2.5 | Local | High | Low | Required | Changed | Low | None | None | 10, 11 |
This Critical Patch Update contains 2 new security patches for Oracle Utilities Applications. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2018-1000632 | Oracle Utilities Framework | Common (Dom4J) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 2.2.0, 4.2.0.2, 4.2.0.3, 4.3.0.2 - 4.3.0.6, 4.4.0.0, 4.4.0.2 | |
CVE-2017-12626 | Oracle Utilities Network Management System | Upload (Apache POI) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 1.12.0.3, 2.3.0.1, 2.3.0.2, 2.4.0.0 |
This Critical Patch Update contains 20 new security patches for Oracle Virtualization. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2902 | Oracle VM VirtualBox | Core | None | No | 8.8 | Local | Low | Low | None | Changed | High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2959 | Oracle VM VirtualBox | Core | MLD | Yes | 8.6 | Network | Low | None | None | Changed | None | None | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2742 | Oracle VM VirtualBox | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | Prior to 5.2.36, prior to 6.0.16, prior to 6.1.2 | |
CVE-2020-2905 | Oracle VM VirtualBox | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2908 | Oracle VM VirtualBox | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2758 | Oracle VM VirtualBox | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2929 | Oracle VM VirtualBox | Core | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2575 | Oracle VM VirtualBox | Core | None | No | 7.5 | Local | High | High | None | Changed | High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2911 | Oracle VM VirtualBox | Core | None | No | 7.5 | Local | High | High | None | Changed | High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2907 | Oracle VM VirtualBox | Core | None | No | 7.5 | Local | High | High | None | Changed | High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2958 | Oracle VM VirtualBox | Core | None | No | 7.5 | Local | High | High | None | Changed | High | High | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2913 | Oracle VM VirtualBox | Core | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | Prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2914 | Oracle VM VirtualBox | Core | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | Prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2910 | Oracle VM VirtualBox | Core | None | No | 6.5 | Local | Low | Low | None | Changed | None | High | None | Prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2951 | Oracle VM VirtualBox | Core | None | No | 6.5 | Local | Low | Low | None | Changed | None | None | High | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2741 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | High | None | None | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2743 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | High | None | None | Prior to 5.2.36, prior to 6.0.16, prior to 6.1.2 | |
CVE-2020-2894 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | High | None | None | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2748 | Oracle VM VirtualBox | Core | None | No | 3.2 | Local | Low | High | None | Changed | Low | None | None | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 | |
CVE-2020-2909 | Oracle VM VirtualBox | Core | None | No | 2.8 | Local | Low | Low | Required | Un- changed |
None | None | Low | Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6 |