A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 349 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at July 2022 Critical Patch Update: Executive Summary and Analysis.
Please note that since the release of the April 2022 Critical Patch Update, Oracle has released a Security Alert for Oracle E-Business Suite CVE-2022-21500 (May 19, 2022). Customers are strongly advised to apply the July 2022 Critical Patch Update for Oracle E-Business Suite, which includes patches for this Alert as well as additional patches.
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.
Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:
Date | Note |
---|---|
2022-October-31 | Rev 4. Updated Credit section |
2022-July-28 | Rev 3. Updated the affected versions WebLogic CVE-2021-40690 |
2022-July-25 | Rev 2. Updated the version details for WebCenter Sites Support Tools and Credit added for CVE-2022-21551 |
2022-July-19 | Rev 1. Initial Release. |
This Critical Patch Update contains 23 new security patches for Oracle Database Products divided as follows:
This Critical Patch Update contains 9 new security patches plus additional third party patches noted below for Oracle Database Products. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. 1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
CVE# | Component | Package and/or Privilege Required | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-35169 | Oracle Database - Enterprise Edition | None | TCPS | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.1.0.2, 19c, 21c | |
CVE-2022-21510 | Oracle Database - Enterprise Edition Sharding | Local Logon | None | No | 8.8 | Local | Low | Low | None | Changed | High | High | High | None | See Note 1 |
CVE-2022-21511 | Oracle Database - Enterprise Edition Recovery | EXECUTE ON DBMS_IR.EXECUTESQLSCRIPT | Oracle Net | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | None | See Note 1 |
CVE-2022-21565 | Java VM | Create Procedure | Oracle Net | No | 6.5 | Network | Low | Low | None | Un- changed |
None | High | None | 12.1.0.2, 19c, 21c | |
CVE-2022-24729 | Oracle Application Express (CKEditor) | User Account | HTTP | No | 5.7 | Network | Low | Low | Required | Un- changed |
None | None | High | Prior to 22.1.1 | |
CVE-2021-41184 | Oracle Application Express (jQueryUI) | User Account | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | Prior to 22.1.1 | |
CVE-2022-0839 | Oracle SQLcl (Liquibase) | Local Logon | None | No | 5.0 | Local | Low | Low | Required | Un- changed |
High | None | None | 19c | |
CVE-2021-45943 | Oracle Spatial and Graph (GDAL) | Create Session | Oracle Net | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 19c, 21c | |
CVE-2022-21432 | Oracle Database - Enterprise Edition RDBMS Security | DBA role | Oracle Net | No | 2.7 | Network | Low | High | None | Un- changed |
None | None | Low | 12.1.0.2, 19c, 21c |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Autonomous Health Framework. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Autonomous Health Framework. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Berkeley DB. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Berkeley DB. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 3 new security patches for Oracle Big Data Graph. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-42340 | Big Data Spatial and Graph | Big Data Graph (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 23.1 | |
CVE-2020-36518 | Big Data Spatial and Graph | Big Data Graph (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 23.1 | |
CVE-2021-41184 | Big Data Spatial and Graph | Big Data Graph (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 23.1 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Blockchain Platform. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Blockchain Platform. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 1 new security patch for Oracle Essbase. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-21508 | Oracle Essbase | Security and Provisioning | None | No | 5.8 | Local | Low | High | Required | Un- changed |
High | High | None | 21.3 |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Global Lifecycle Management. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-23437 | Oracle Global Lifecycle Management OPatch | Patch Installer (Apache Xerces-J) | Local Logon | No | 4.2 | Local | Low | High | Required | Un- changed |
None | None | High | Prior to 12.2.0.1.30 |
This Critical Patch Update contains 4 new security patches plus additional third party patches noted below for Oracle GoldenGate. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-3749 | Oracle GoldenGate | Oracle GoldenGate (axios) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 21c: prior to 21.7.0.0.0 | |
CVE-2022-21551 | Oracle GoldenGate | Oracle GoldenGate | HTTP | No | 6.8 | Network | Low | High | Required | Un- changed |
High | High | High | 21c: prior to 21.7.0.0.0; 19c: prior to 19.1.0.0.220719 | |
CVE-2021-34429 | Oracle Stream Analytics | Oracle Stream Analytics (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 19c: prior to 19.1.0.0.6.4 | |
CVE-2021-37714 | Oracle Stream Analytics | Oracle Stream Analytics (jsoup) | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 19c: prior to 19.1.0.0.6.4 |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Graph Server and Client. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-36518 | Oracle Graph Server and Client | Oracle Graph Server (jackson-databind) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | Prior to 22.2.0 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle NoSQL Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 2 new security patches for Oracle REST Data Services. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-41184 | Oracle REST Data Services | Oracle REST Data Services (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 22.1.1 | |
CVE-2021-34429 | Oracle REST Data Services | Oracle REST Data Services (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | Prior to 22.1.1 |
This Critical Patch Update contains 1 new security patch for Oracle Spatial Studio. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-36518 | Oracle Spatial Studio | Oracle Spatial Studio (jackson-databind) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | Prior to 22.1.0 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle SQL Developer. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle SQL Developer. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle TimesTen In-Memory Database. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2351 | Oracle TimesTen In-Memory Database | Oracle TimesTen In-Memory Database Cache | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | Prior to 22.1.1.1.0 |
This Critical Patch Update contains 12 new security patches for Oracle Commerce. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-10683 | Oracle Commerce Guided Search | Content Acquisition System (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.3.2 | |
CVE-2019-17495 | Oracle Commerce Guided Search | Framework, Experience Manager (Swagger UI) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.3.2 | |
CVE-2022-22965 | Oracle Commerce Platform | Endeca Integration (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.3.2 | |
CVE-2020-28052 | Oracle Commerce Guided Search | Framework, Experience Manager (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 11.3.2 | |
CVE-2021-40690 | Oracle Commerce Guided Search | Content Acquisition System (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 11.3.2 | |
CVE-2021-22946 | Oracle Commerce Guided Search | Framework, Experience Manager (cURL) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 11.3.2 | |
CVE-2022-24729 | Oracle Commerce Merchandising | Core (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11.3.2 | |
CVE-2020-36518 | Oracle Commerce Platform | Dynamo Application Framework (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11.3.0, 11.3.1, 11.3.2 | |
CVE-2021-40690 | Oracle Commerce Platform | Endeca Integration (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 11.3.2 | |
CVE-2021-3450 | Oracle Commerce Guided Search | Framework, Experience Manager (OpenSSL) | TLS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 11.3.2 | |
CVE-2020-7712 | Oracle Commerce Guided Search | Framework, Experience Manager (Apache ZooKeeper) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 11.3.2 | |
CVE-2022-21559 | Oracle Commerce Platform | Dynamo Application Framework | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 11.3.0, 11.3.1, 11.3.2 |
This Critical Patch Update contains 17 new security patches plus additional third party patches noted below for Oracle Communications Applications. 12 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-23305 | Oracle Communications Instant Messaging Server | XMPP Server (Apache Log4j) | XMPP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.0.1.5.0 | |
CVE-2022-23305 | Oracle Communications Offline Mediation Controller | Charging Server (Apache Log4j) | LDAP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | Prior to 12.0.0.4.4, Prior to 12.0.0.5.1 | |
CVE-2022-23632 | Oracle Communications Unified Inventory Management | Cloud Native (Traefik) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 7.5.0 | |
CVE-2022-22965 | Oracle Communications Unified Inventory Management | TMF APIs (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 7.4.1, 7.4.2, 7.5.0 | |
CVE-2022-21429 | Oracle Communications Billing and Revenue Management | Billing Care | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 12.0.0.4.0-12.0.0.6.0 | |
CVE-2020-36518 | Oracle Communications Billing and Revenue Management | Billing Care, BOC, DM Kafka, REST API (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.0.0.4.0-12.0.0.6.0 | |
CVE-2021-37137 | Oracle Communications BRM - Elastic Charging Engine | 5G gateway (Google Snappy) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 12.0.0.4.6, Prior to 12.0.0.5.1 | |
CVE-2021-43859 | Oracle Communications BRM - Elastic Charging Engine | EM Gateway (XStream) | TCP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 12.0.0.4.6, Prior to 12.0.0.5.1 | |
CVE-2021-44832 | Oracle Communications BRM - Elastic Charging Engine | Charging Server (Apache Log4j) | TCP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | Prior to 12.0.0.4.6, Prior to 12.0.0.5.1 | |
CVE-2021-44832 | Oracle Communications Offline Mediation Controller | Admin Server and Node Manager (Apache Log4j) | LDAP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | Prior to 12.0.0.4.4, Prior to 12.0.0.5.1 | |
CVE-2022-23437 | Oracle Communications ASAP | SRT (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 7.3 | |
CVE-2022-21573 | Oracle Communications Billing and Revenue Management | Billing Care | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 12.0.0.4.0-12.0.0.6.0 | |
CVE-2021-43797 | Oracle Communications Design Studio | PSR Designer (Netty) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | High | None | 7.4.2 | |
CVE-2022-22969 | Oracle Communications Design Studio | Patch Request (Spring Security OAuth) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 7.4.2 | |
CVE-2021-38153 | Oracle Communications BRM - Elastic Charging Engine | Notifications (Apache Kafka) | TCP | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | Prior to 12.0.0.4.6, Prior to 12.0.0.5.1 | |
CVE-2022-21572 | Oracle Communications Billing and Revenue Management | Billing Care | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 12.0.0.4.0-12.0.0.6.0 | |
CVE-2022-21574 | Oracle Communications Billing and Revenue Management | Connection Manager | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 12.0.0.4.0-12.0.0.6.0 |
This Critical Patch Update contains 56 new security patches plus additional third party patches noted below for Oracle Communications. 45 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-22947 | Oracle Communications Cloud Native Core Binding Support Function | BSF (Spring Cloud Gateway) | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 22.1.3 | |
CVE-2022-22947 | Oracle Communications Cloud Native Core Console | CNC Console (Spring Cloud Gateway) | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 22.2.0 | |
CVE-2022-22947 | Oracle Communications Cloud Native Core Network Repository Function | NRF (Spring Cloud Gateway) | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 22.1.2, 22.2.0 | |
CVE-2022-22947 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (Spring Cloud Gateway) | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 22.1.1 | |
CVE-2022-22965 | Oracle Communications Cloud Native Core Binding Support Function | BSF (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.3 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Binding Support Function | BSF (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.3 | |
CVE-2022-1154 | Oracle Communications Cloud Native Core Network Exposure Function | NEF (vim) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.1 | |
CVE-2020-14343 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (PyYAML) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.0 | |
CVE-2021-3177 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (Python) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.2.0 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.0 | |
CVE-2022-22963 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | DBTier (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.2 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Network Repository Function | NRF (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.2, 22.2.0 | |
CVE-2022-22963 | Oracle Communications Cloud Native Core Policy | Policy (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.3 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.1.1 | |
CVE-2022-25845 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (fastjson) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.2.0 | |
CVE-2022-23219 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (glibc) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 22.2.0 | |
CVE-2022-23219 | Oracle Enterprise Operations Monitor | Mediation Engine (glibc) | TCP/IP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 4.3, 4.4, 5.0 | |
CVE-2022-24407 | Oracle Communications Cloud Native Core Console | CNC Console (Cyrus SASL) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 22.2.0 | |
CVE-2022-24407 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (Cyrus SASL) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 22.2.0 | |
CVE-2022-24407 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (Cyrus SASL) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 22.1.1 | |
CVE-2022-25636 | Oracle Communications Cloud Native Core Binding Support Function | Oracle Linux | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 22.1.3 | |
CVE-2022-25636 | Oracle Communications Cloud Native Core Network Exposure Function | Oracle Linux | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 22.1.1 | |
CVE-2022-25636 | Oracle Communications Cloud Native Core Policy | Oracle Linux | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 22.2.0 | |
CVE-2022-24735 | Oracle Communications Operations Monitor | Fraud Detection Monitor (Redis) | None | No | 7.8 | Local | Low | None | Required | Un- changed |
High | High | High | 4.3, 4.4, 5.0 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Binding Support Function | BSF (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.3 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Binding Support Function | BSF (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.2.0 | |
CVE-2018-25032 | Oracle Communications Cloud Native Core Console | CNC Console (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.2 | |
CVE-2018-25032 | Oracle Communications Cloud Native Core Network Exposure Function | NEF (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.1 | |
CVE-2019-20916 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (Package Installer for Python) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 22.1.0 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | CNE (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.0 | |
CVE-2021-22119 | Oracle Communications Cloud Native Core Network Repository Function | NRF (Spring Security) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.2, 22.2.0 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Network Repository Function | NRF (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.2, 22.2.0 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Network Repository Function | NRF (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.2, 22.2.0 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Network Slice Selection Function | NSSF (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.1 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Network Slice Selection Function | NSSF (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.1 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.1 | |
CVE-2018-25032 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.1 | |
CVE-2022-0778 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | SEPP (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.1.1 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Service Communication Proxy | SCP (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.2.0 | |
CVE-2020-36518 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.2.0 | |
CVE-2022-23308 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (libxml2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.2.0 | |
CVE-2018-25032 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.2.0 | |
CVE-2022-0778 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 22.2.0 | |
CVE-2022-0778 | Oracle Communications Core Session Manager | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.5, 8.4.5 | |
CVE-2022-0778 | Oracle Communications Operations Monitor | Mediation Engine (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 4.3, 4.4, 5.0 | |
CVE-2022-0778 | Oracle Communications Session Border Controller | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.4, 9.0, 9.1 | |
CVE-2022-0778 | Oracle Communications Unified Session Manager | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.5 | |
CVE-2022-0778 | Oracle Enterprise Communications Broker | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 3.3 | |
CVE-2022-0778 | Oracle Enterprise Session Border Controller | Security (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.4, 9.0, 9.1 | |
CVE-2020-36518 | Oracle SD-WAN Edge | MGMT (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 9.0, 9.1 | |
CVE-2022-1271 | Oracle Communications Cloud Native Core Console | CNC Console (GNU Gzip) | HTTP | No | 7.1 | Network | High | Low | Required | Un- changed |
High | High | High | 22.1.2 | |
CVE-2022-1271 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (GNU Gzip) | HTTP | No | 7.1 | Network | High | Low | Required | Un- changed |
High | High | High | 22.2.0 | |
CVE-2021-37750 | Oracle Communications Cloud Native Core Network Slice Selection Function | NSSF (MIT Kerberos) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 22.1.1 | |
CVE-2021-3572 | Oracle Communications Cloud Native Core Policy | Policy (Package Installer for Python) | HTTP | No | 5.7 | Network | Low | Low | Required | Un- changed |
None | High | None | 22.1.3 | |
CVE-2022-24329 | Oracle Communications Cloud Native Core Binding Support Function | BSF (JetBrains Kotlin) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 22.1.3 | |
CVE-2021-34141 | Oracle Communications Cloud Native Core Policy | Policy (NumPy) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 22.1.3 |
This Critical Patch Update contains 7 new security patches plus additional third party patches noted below for Oracle Construction and Engineering. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-21558 | Oracle Crystal Ball | Installation | None | No | 7.8 | Local | High | Low | None | Changed | High | High | High | 11.1.2.0.000-11.1.2.4.900 | |
CVE-2020-36518 | Primavera Gateway | Admin (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.12.0-17.12.11, 18.8.0-18.8.14, 19.12.0-19.12.13, 20.12.0-20.12.8, 21.12.0-21.12.1 | |
CVE-2020-36518 | Primavera Unifier | Document Management (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.7-17.12, 18.8, 19.12, 20.12, 21.12 | |
CVE-2022-23437 | Primavera Gateway | Admin (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 17.12.0-17.12.11, 18.8.0-18.8.14, 19.12.0-19.12.13, 20.12.0-20.12.8 | |
CVE-2020-36518 | Primavera P6 Enterprise Project Portfolio Management | Web Access (jackson-databind) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 17.12.0.0-17.12.20.4, 18.8.0.0-18.8.25.4, 19.12.0.0-19.12.19.0, 20.12.0.0-20.12.14.0, 21.12.0.0-21.12.4.0 | |
CVE-2022-23437 | Primavera Unifier | Platform, User Interface (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 17.7-17.12, 18.8, 19.12, 20.12, 21.12 | |
CVE-2022-30126 | Primavera Unifier | Document Management (Apache Tika) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 17.7-17.12, 18.8, 19.12, 20.12, 21.12 |
This Critical Patch Update contains 6 new security patches for Oracle E-Business Suite. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the July 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (July 2022), My Oracle Support Note 2484000.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-23305 | Oracle E-Business Suite Information Discovery | Packaging issues (Apache Log4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.3-12.2.11 | |
CVE-2022-21566 | Oracle Applications Framework | Diagnostics | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.9-12.2.11 | |
CVE-2022-21500 | Oracle User Management | Proxy User Delegation | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.4-12.2.11 | |
CVE-2022-21567 | Oracle Workflow | Worklist | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.3-12.2.11 | |
CVE-2022-21568 | Oracle iReceivables | Access Request | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 12.2.3-12.2.11 | |
CVE-2022-21545 | Oracle iRecruitment | Candidate Self Service Registration | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.2.3-12.2.11 |
This Critical Patch Update contains 6 new security patches plus additional third party patches noted below for Oracle Enterprise Manager. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the July 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2867874.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-22721 | Enterprise Manager Ops Center | Networking (Apache HTTP Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.4.0.0 | |
CVE-2022-1292 | Enterprise Manager Ops Center | Networking (OpenSSL) | HTTPS | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.4.0.0 | |
CVE-2022-21536 | Enterprise Manager Base Platform | Policy Framework | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 13.4.0.0, 13.5.0.0 | |
CVE-2020-5258 | Oracle Application Testing Suite | Load Testing for Web Apps (Dojo) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 13.3.0.1 | |
CVE-2022-21516 | Enterprise Manager Base Platform | Enterprise Manager Install | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 13.4.0.0, 13.5.0.0 | |
CVE-2022-29577 | Enterprise Manager Base Platform | Enterprise Manager Install (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 13.4.0.0, 13.5.0.0 |
This Critical Patch Update contains 59 new security patches for Oracle Financial Services Applications. 38 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-22963 | Oracle Banking Branch | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Cash Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Corporate Lending Process Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Credit Facilities Process Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Electronic Data Exchange for Corporates | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Liquidity Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.2, 14.5 | |
CVE-2022-22963 | Oracle Banking Origination | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Supply Chain Finance | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Trade Finance Process Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2022-22963 | Oracle Banking Virtual Account Management | Common (Spring Cloud Function) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.5 | |
CVE-2021-41303 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Shiro) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2018-1273 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Spring Data Commons) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-22978 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Spring Security) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2020-9492 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Hadoop) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2020-9492 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Solr) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-24729 | Oracle Financial Services Analytical Applications Infrastructure | Others (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 | |
CVE-2020-36518 | Oracle Financial Services Analytical Applications Infrastructure | Others (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 | |
CVE-2022-24729 | Oracle Financial Services Behavior Detection Platform | Third Party (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.0, 8.0.8.0, 8.1.1.0-8.1.2.1 | |
CVE-2020-36518 | Oracle Financial Services Behavior Detection Platform | Web UI (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.0, 8.0.8.0, 8.1.1.0-8.1.2.1 | |
CVE-2021-36090 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-38296 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Spark) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-25647 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Google GSON) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2020-36518 | Oracle Financial Services Crime and Compliance Management Studio | Studio (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-37714 | Oracle Financial Services Crime and Compliance Management Studio | Studio (jsoup) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-24729 | Oracle Financial Services Enterprise Case Management | Installers (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0-8.1.2.1 | |
CVE-2020-36518 | Oracle Financial Services Enterprise Case Management | Installers (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0-8.1.2.1 | |
CVE-2022-24729 | Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition | User Interface (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.0, 8.0.8.0 | |
CVE-2020-36518 | Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition | User Interface (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.0, 8.0.8.0 | |
CVE-2021-40690 | Oracle FLEXCUBE Private Banking | Infrastructure (Apache Santuario XML Security For Java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.1 | |
CVE-2021-43859 | Oracle FLEXCUBE Private Banking | Infrastructure (XStream) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.1 | |
CVE-2020-7712 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache ZooKeeper) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-23337 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-21544 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 7.1 | Network | High | Low | Required | Un- changed |
High | High | High | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2022-23181 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Tomcat) | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-21582 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed |
High | High | Low | 14.5 | |
CVE-2022-21585 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed |
High | High | Low | 14.5 | |
CVE-2022-21428 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed |
High | High | Low | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2022-21578 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed |
High | High | Low | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2021-44832 | Oracle FLEXCUBE Private Banking | Infrastructure (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | 12.1 | |
CVE-2022-23437 | Oracle Banking Deposits and Lines of Credit Servicing | Web UI (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 2.7 | |
CVE-2021-43797 | Oracle Banking Deposits and Lines of Credit Servicing | Web UI (Netty) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | High | None | 2.7 | |
CVE-2022-23437 | Oracle Banking Party Management | Web UI (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 2.7 | |
CVE-2021-43797 | Oracle Banking Party Management | Web UI (Netty) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | High | None | 2.7 | |
CVE-2021-43797 | Oracle Banking Platform | SECURITY (Netty) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | High | None | 2.6.2 | |
CVE-2022-23437 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-22971 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Spring Framework) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2022-23437 | Oracle FLEXCUBE Universal Banking | Infrastructure (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 12.4 | |
CVE-2022-21583 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.4 | Network | High | Low | None | Un- changed |
High | Low | Low | 14.5 | |
CVE-2022-21584 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.4 | Network | High | Low | Required | Un- changed |
High | High | None | 14.5 | |
CVE-2022-21586 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 6.4 | Network | High | Low | Required | Un- changed |
High | High | None | 14.5 | |
CVE-2022-21576 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.4 | Network | High | Low | None | Un- changed |
High | Low | Low | 12.3, 12.4, 14.0-14.3, 14.5 | |
CVE-2022-21577 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.4 | Network | High | Low | Required | Un- changed |
High | High | None | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2022-21579 | Oracle FLEXCUBE Universal Banking | Infrastructure | HTTP | No | 6.4 | Network | High | Low | Required | Un- changed |
High | High | None | 12.1-12.4, 14.0-14.3, 14.5 | |
CVE-2021-41184 | Oracle Banking Platform | SECURITY (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 2.9, 2.12 | |
CVE-2022-21581 | Oracle Banking Trade Finance | Infrastructure | HTTP | No | 5.9 | Network | High | Low | Required | Un- changed |
Low | High | Low | 14.5 | |
CVE-2022-21580 | Oracle Financial Services Revenue Management and Billing | Infrastructure | HTTP | No | 5.9 | Network | High | Low | Required | Un- changed |
High | Low | Low | 2.9.0.0.0, 2.9.0.1.0, 3.0.0.0.0-3.2.0.0.0, 4.0.0.0.0 | |
CVE-2022-24823 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Netty) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-34429 | Oracle Financial Services Crime and Compliance Management Studio | Studio (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.0.8.2.0, 8.0.8.3.0 | |
CVE-2021-29425 | Oracle FLEXCUBE Core Banking | Securities (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 5.2, 11.6-11.8, 11.10 |
This Critical Patch Update contains 3 new security patches for Oracle Food and Beverage Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2351 | Oracle Hospitality Inventory Management | Installation (ODP for .NET) | Oracle Net | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 9.1 | |
CVE-2021-41184 | Oracle Hospitality Inventory Management | Receipt (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.1 | |
CVE-2021-41184 | Oracle Hospitality Materials Control | Receipt (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 18.1 |
This Critical Patch Update contains 38 new security patches plus additional third party patches noted below for Oracle Fusion Middleware. 32 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update July 2022 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2880163.2.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-42575 | Oracle Middleware Common Libraries and Tools | Third Party Patch (AntiSamy) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2022-23457 | Oracle WebLogic Server | Centralized Third Party Jars (OWASP Enterprise Security API) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-23450 | Oracle WebLogic Server | Sample apps (Dojo) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-22965 | Oracle WebLogic Server | Third Party Tools, Samples (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2019-10082 | Oracle HTTP Server | SSL Module (Apache HTTP Server) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-35169 | Oracle HTTP Server | SSL Module (Dell BSAFE Micro Edition Suite) | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-23926 | Oracle Middleware Common Libraries and Tools | Thirdparty Patch (Apache XMLBeans) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-35169 | Oracle Security Service | C Oracle SSL API (Dell BSAFE Micro Edition Suite) | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-26291 | Oracle WebLogic Server | Centralized Third Party Jars (Apache Maven) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-35169 | Oracle Weblogic Server Proxy Plug-in | SSL Module (Dell BSAFE Micro Edition Suite) | HTTPS | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-39139 | Oracle WebCenter Portal | Security Framework (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2351 | Oracle WebLogic Server | Installer (OCCI) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-11987 | Oracle WebLogic Server | Centralized Third Party Jars (Apache Batik) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed |
High | Low | None | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2019-0227 | Oracle BI Publisher | BI Publisher Security (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-36518 | Oracle Coherence | Centralized Thirdparty Jars (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 14.1.1.0.0 | |
CVE-2022-21570 | Oracle Coherence | Core | T3, IIOP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 3.7.1.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-36518 | Oracle Global Lifecycle Management NextGen OUI Framework | NextGen Installer issues (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 13.9.4.2.10 | |
CVE-2021-42340 | Oracle Managed File Transfer | MFT Runtime Server (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-37714 | Oracle Middleware Common Libraries and Tools | Thirdparty Patch (jsoup) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2022-21562 | Oracle SOA Suite | Fabric Layer | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-36518 | Oracle WebLogic Server | Centralized Third Party Jars (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-24839 | Oracle WebLogic Server | Centralized Third Party Jars (NekoHTML) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-28491 | Oracle WebLogic Server | Centralized Third Party Jars (jackson-dataformats-binary) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-40690 | Oracle WebLogic Server | Centralized Thirdparty Jars (Apache Santuario XML Security For Java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-21552 | Oracle WebCenter Content | Search | HTTP | Yes | 7.2 | Network | Low | None | None | Changed | Low | Low | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-35940 | Oracle HTTP Server | SSL Module (Apache Portable Runtime) | None | No | 7.1 | Local | Low | Low | None | Un- changed |
High | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-30129 | Oracle Global Lifecycle Management NextGen OUI Framework | NextGen Installer issues (Apache MINA SSHD) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | Prior to 13.9.4.2.10 | |
CVE-2022-23437 | Oracle Global Lifecycle Management NextGen OUI Framework | NextGen Installer issues (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | Prior to 13.9.4.2.10 | |
CVE-2022-21548 | Oracle WebLogic Server | Core | T3, IIOP | Yes | 6.5 | Network | Low | None | None | Un- changed |
None | Low | Low | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-11023 | Oracle Business Intelligence Enterprise Edition | Service Administration UI (JQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 5.9.0.0.0 | |
CVE-2020-1927 | Oracle HTTP Server | SSL Module (Apache HTTP Server) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2022-29577 | Oracle WebLogic Server | Centralized Third Party Jars (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-21575 | Oracle WebCenter Sites Support Tools | User Interface | HTTP | No | 6.0 | Network | Low | High | None | Un- changed |
High | Low | Low | 4.4.2 and Prior | |
CVE-2022-21557 | Oracle WebLogic Server | Web Container | None | No | 5.7 | Local | High | High | None | Un- changed |
High | High | None | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2019-0220 | Oracle HTTP Server | Web Listener (Apache HTTP Server) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.2.1.3.0 | |
CVE-2022-21560 | Oracle WebLogic Server | Core | T3, IIOP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-21564 | Oracle WebLogic Server | Web Services | T3, IIOP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2022-21523 | Oracle BI Publisher | BI Publisher Security | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 12.2.1.3.0, 12.2.1.4.0 |
This Critical Patch Update contains 6 new security patches for Oracle Health Sciences Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-36518 | Oracle Health Sciences Empirica Signal | Web Services (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 9.1.0.52, 9.2.0.52 | |
CVE-2019-10086 | Oracle Health Sciences Data Management Workbench | User Interface (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 2.5.2.1, 3.0.0.0 | |
CVE-2021-23337 | Oracle Health Sciences Data Management Workbench | User Interface (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 2.5.2.1, 3.0.0.0 | |
CVE-2021-44832 | Oracle Health Sciences Data Management Workbench | User Interface (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | 2.5.2.1, 3.0.0.0, 3.1.0.3 | |
CVE-2022-21518 | Oracle Health Sciences Data Management Workbench | User Interface | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 2.4.8.7, 2.5.2.1 | |
CVE-2021-29425 | Oracle Health Sciences Data Management Workbench | User Interface (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 2.5.2.1, 3.0.0.0 |
This Critical Patch Update contains 3 new security patches for Oracle HealthCare Applications. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-33813 | Oracle Healthcare Foundation | Upload Service (Apache Tika) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.1.0, 8.2.0, 8.2.1 | |
CVE-2022-23437 | Oracle Health Sciences Information Manager | Health Policy Engine (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 3.0.0.1, 3.0.1.0-3.0.5.0 | |
CVE-2021-36374 | Oracle Health Sciences Information Manager | Health Policy Engine (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 3.0.0.1, 3.0.1.0-3.0.5.0 |
This Critical Patch Update contains 2 new security patches for Oracle Hospitality Applications. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-31805 | Oracle Hospitality OPERA 5 | Login (Apache Struts) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 5.6 | |
CVE-2022-29885 | Oracle Hospitality Cruise Shipboard Property Management System | Next-Gen SPMS (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 20.2.1 |
This Critical Patch Update contains 5 new security patches for Oracle Java SE. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-34169 | Oracle Java SE, Oracle GraalVM Enterprise Edition | JAXP (Xalan-J) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 | See Note 1 |
CVE-2022-25647 | Oracle GraalVM Enterprise Edition | Native Image (Gson) | None | No | 6.2 | Local | Low | None | None | Un- changed |
None | None | High | Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 | |
CVE-2022-21541 | Oracle Java SE, Oracle GraalVM Enterprise Edition | Hotspot | Multiple | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 | See Note 1 |
CVE-2022-21540 | Oracle Java SE, Oracle GraalVM Enterprise Edition | Hotspot | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 | See Note 1 |
CVE-2022-21549 | Oracle Java SE, Oracle GraalVM Enterprise Edition | Libraries | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2, 22.1.0 | See Note 1 |
This Critical Patch Update contains 6 new security patches for Oracle JD Edwards. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-22931 | JD Edwards EnterpriseOne Tools | E1 Dev Platform Tech - Cloud (Node.js) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 9.2.6.1 and prior | |
CVE-2021-31684 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator (JSON Smart) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 9.2.6.3 and prior | |
CVE-2022-21542 | JD Edwards EnterpriseOne Tools | Web Runtime | HTTP | No | 7.4 | Network | Low | Low | None | Changed | Low | Low | Low | 9.2.6.3 and prior | |
CVE-2022-21561 | JD Edwards EnterpriseOne Tools | Web Runtime | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.2.6.3 and prior | |
CVE-2021-41184 | JD Edwards EnterpriseOne Tools | Web Runtime (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.2.6.3 and prior | |
CVE-2022-21532 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 9.2.6.3 and prior |
This Critical Patch Update contains 34 new security patches plus additional third party patches noted below for Oracle MySQL. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-31805 | MySQL Enterprise Monitor | Monitoring: General (Apache Struts) | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.30 and prior | |
CVE-2022-1292 | MySQL Server | Server: Packaging (OpenSSL) | MySQL Protocol | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 5.7.38 and prior, 8.0.29 and prior | |
CVE-2022-1292 | MySQL Workbench | Workbench (OpenSSL) | MySQL Workbench | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.29 and prior | |
CVE-2022-21824 | MySQL Cluster | Cluster: General (Node.js) | Multiple | Yes | 8.2 | Network | Low | None | None | Un- changed |
None | Low | High | 8.0.29 and prior | |
CVE-2022-27778 | MySQL Server | Server: Packaging (cURL) | MySQL Protocol | Yes | 8.1 | Network | Low | None | Required | Un- changed |
None | High | High | 5.7.38 and prior, 8.0.29 and prior | |
CVE-2021-22119 | MySQL Enterprise Monitor | Monitoring: General (Spring Security) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2018-25032 | MySQL Server | Server: Compiling (zlib) | MySQL Protocol | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 5.7.38 and prior, 8.0.29 and prior | |
CVE-2022-23308 | MySQL Workbench | Workbench (libxml2) | MySQL Workbench | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2020-26237 | MySQL Enterprise Monitor | Monitoring: General (highlight.js) | Multiple | No | 6.8 | Network | Low | Low | Required | Changed | None | High | None | 8.0.30 and prior | |
CVE-2022-21556 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | High | None | Un- changed |
None | High | High | 8.0.28 and prior | |
CVE-2022-21569 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21550 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Adjacent Network |
High | High | Required | Un- changed |
High | High | High | 7.4.36 and prior,7.5.26 and prior, 7.6.22 and prior, and 8.0.29 and prior | |
CVE-2022-21519 | MySQL Cluster | Cluster: General | Multiple | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21527 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed |
None | Low | High | 8.0.29 and prior | |
CVE-2022-21528 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed |
None | Low | High | 8.0.29 and prior | |
CVE-2022-21509 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed |
None | Low | High | 8.0.29 and prior | |
CVE-2022-22968 | MySQL Enterprise Monitor | Service Manager (Spring Framework) | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.0.29 and prior | |
CVE-2022-21539 | MySQL Server | InnoDB | MySQL Protocol | No | 5.0 | Network | High | Low | None | Un- changed |
Low | Low | Low | 8.0.29 and prior | |
CVE-2022-21517 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21537 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21547 | MySQL Server | Server: Federated | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21525 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21526 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21529 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21530 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21531 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21553 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21515 | MySQL Server | Server: Options | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.7.38 and prior, 8.0.29 and prior | |
CVE-2022-21455 | MySQL Server | Server: PAM Auth Plugin | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | High | None | 8.0.28 and prior | |
CVE-2022-21534 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21522 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 8.0.29 and prior | |
CVE-2022-21555 | MySQL Shell for VS Code | Shell: GUI | None | No | 4.2 | Local | Low | High | Required | Changed | Low | Low | None | 1.1.8 and prior | |
CVE-2022-21538 | MySQL Server | Server: Security: Encryption | MySQL Protocol | No | 3.1 | Network | High | Low | None | Un- changed |
None | None | Low | 8.0.29 and prior | |
CVE-2022-21535 | MySQL Shell | Shell: General/Core Client | None | No | 2.5 | Local | High | None | Required | Un- changed |
None | None | Low | 8.0.28 and prior |
This Critical Patch Update contains 11 new security patches for Oracle PeopleSoft. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-21543 | PeopleSoft Enterprise PeopleTools | Updates Environment Mgmt | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.58, 8.59 | |
CVE-2020-36518 | PeopleSoft Enterprise PeopleTools | Elastic Search (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.58, 8.59 | |
CVE-2018-25032 | PeopleSoft Enterprise PeopleTools | PeopleSoft CDA (zlib) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.58, 8.59 | |
CVE-2022-24729 | PeopleSoft Enterprise PeopleTools | Rich Text Editor (CKEditor) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.58, 8.59 | |
CVE-2021-31684 | PeopleSoft Enterprise PeopleTools | Security (JSON Smart) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.58, 8.59 | |
CVE-2022-23437 | PeopleSoft Enterprise PeopleTools | Security (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 8.58, 8.59 | |
CVE-2022-21520 | PeopleSoft Enterprise PeopleTools | Fluid Core | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.58, 8.59 | |
CVE-2020-7656 | PeopleSoft Enterprise PeopleTools | PeopleSoft CDA (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.58 | |
CVE-2021-41182 | PeopleSoft Enterprise PeopleTools | XML Publisher (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.58, 8.59 | |
CVE-2022-21521 | PeopleSoft Enterprise PeopleTools | XML Publisher | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
High | None | None | 8.58, 8.59 | |
CVE-2022-21512 | PeopleSoft Enterprise PeopleTools | Integration Broker | None | No | 4.4 | Local | Low | High | None | Un- changed |
High | None | None | 8.58, 8.59 |
This Critical Patch Update contains 3 new security patches for Oracle Policy Automation. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-44832 | Oracle Policy Automation | Determinations Engine (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | 12.2.0-12.2.24 | |
CVE-2021-44832 | Oracle Policy Automation for Mobile Devices | Core Functionality (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | 12.2.0-12.2.24 | |
CVE-2021-41184 | Oracle Policy Automation | Determinations Engine (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.0-12.2.25 |
This Critical Patch Update contains 17 new security patches for Oracle Retail Applications. 13 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-22965 | Oracle Retail Bulk Data Integration | BDI Job Scheduler (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 16.0.3 | |
CVE-2022-22965 | Oracle Retail Customer Management and Segmentation Foundation | Security (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 17.0, 18.0, 19.0 | |
CVE-2022-23305 | Oracle Retail Extract Transform and Load | Mathematical Operators (Apache Log4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.2.5 | |
CVE-2022-22965 | Oracle Retail Financial Integration | PeopleSoft Integration Bugs (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 | |
CVE-2022-22965 | Oracle Retail Integration Bus | RIB Kernal (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 | |
CVE-2022-22965 | Oracle Retail Merchandising System | Foundation (Spring Framework) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 16.0.3, 19.0.1 | |
CVE-2021-29505 | Oracle Retail Customer Insights | Other (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 15.0.2, 16.0.2 | |
CVE-2021-22118 | Oracle Retail Customer Insights | Other (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 16.0.2 | |
CVE-2022-25647 | Oracle Retail Order Broker | System Administration (Google GSON) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 18.0, 19.1 | |
CVE-2020-36518 | Oracle Retail Sales Audit | others (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 15.0.3.1 | |
CVE-2019-10086 | Oracle Retail Allocation | General (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 15.0.3.1, 16.0.3 | |
CVE-2019-10086 | Oracle Retail Sales Audit | others (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 16.0.3 | |
CVE-2021-44832 | Oracle Retail Order Broker | Internal Operations (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | 18.0, 19.1 | |
CVE-2021-44832 | Oracle Retail Xstore Point of Service | Xenvironment (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | 17.0.4, 18.0.3, 19.0.2, 20.0.1, 21.0.1 | |
CVE-2021-29425 | Oracle Retail Merchandising System | Foundation (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 16.0.3, 19.0.1 | |
CVE-2021-29425 | Oracle Retail Pricing | Pricing - Security (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 19.0.1 | |
CVE-2021-29425 | Oracle Retail Xstore Point of Service | Xenvironment (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 17.0.4, 18.0.3, 19.0.2, 20.0.1 |
This Critical Patch Update contains 1 new security patch for Oracle Siebel CRM. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-31812 | Siebel Apps - Field Service | Smart Answer (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 22.6 and prior |
This Critical Patch Update contains 24 new security patches for Oracle Supply Chain. 19 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-10683 | Oracle Agile Engineering Data Management | Installation Issues (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 6.2.1.0 | |
CVE-2019-0219 | Oracle Transportation Management | Mobile Applications (Apache cordova-plugin-inappbrowser) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 1.4.4 | |
CVE-2022-25762 | Oracle Agile PLM | Security (Apache Tomcat) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
High | Low | Low | 9.3.6 | |
CVE-2021-2351 | Oracle Agile Product Lifecycle Management for Process | Reporting (ODP for .NET) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 6.2.2, 6.2.3 | |
CVE-2020-11987 | Oracle Agile Engineering Data Management | Installation Issues (Apache Batik) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed |
High | Low | None | 6.2.1.0 | |
CVE-2020-11987 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Batik) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed |
High | Low | None | 3.6.1 | |
CVE-2021-22118 | Oracle Product Lifecycle Analytics | Installation Issues (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 3.6.1 | |
CVE-2021-42340 | Oracle Agile Engineering Data Management | Installation Issues (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 6.2.1.0 | |
CVE-2021-40690 | Oracle Agile PLM | Security (Apache Santuario XML Security For Java) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 9.3.6 | |
CVE-2020-25649 | Oracle Agile PLM | Security (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 9.3.6 | |
CVE-2019-0227 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 3.6.1 | |
CVE-2019-10086 | Oracle Agile Engineering Data Management | Installation Issues (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 6.2.1.0 | |
CVE-2019-10086 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 3.6.1 | |
CVE-2021-44832 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Log4j) | HTTP | No | 6.6 | Network | High | High | None | Un- changed |
High | High | High | 3.6.1 | |
CVE-2022-23437 | Oracle Agile Engineering Data Management | Installation Issues (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 6.2.1.0 | |
CVE-2022-23437 | Oracle Agile PLM | Security (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 9.3.6 | |
CVE-2022-23437 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Xerces-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 3.6.1 | |
CVE-2020-11022 | Oracle Agile PLM | Security (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.3.6 | |
CVE-2021-41184 | Oracle Agile PLM | Security (jQueryUI) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.3.6 | |
CVE-2021-36374 | Oracle Agile Engineering Data Management | Installation Issues (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 6.2.1.0 | |
CVE-2020-17521 | Oracle Agile Engineering Data Management | Installation Issues (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 6.2.1.0 | |
CVE-2021-36374 | Oracle Product Lifecycle Analytics | Installation Issues (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 3.6.1 | |
CVE-2021-34429 | Oracle Autovue for Agile Product Lifecycle Management | Internal Operations (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 21.0.2 | |
CVE-2021-29425 | Oracle Agile Engineering Data Management | Installation Issues (Apache Commons IO) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
Low | Low | None | 6.2.1.0 |
This Critical Patch Update contains 7 new security patches for Oracle Systems. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-21513 | Oracle ZFS Storage Appliance Kit | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | 8.8 | |
CVE-2022-24801 | Oracle ZFS Storage Appliance Kit | Operating System Image | Multiple | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.8 | |
CVE-2022-21524 | Oracle Solaris | Filesystem | SMB | No | 7.6 | Network | Low | Low | None | Un- changed |
Low | Low | High | 11 | |
CVE-2022-21514 | Oracle Solaris | Remote Administration Daemon | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11 | |
CVE-2022-21533 | Oracle Solaris | SMB Server | None | No | 5.5 | Local | Low | Low | None | Un- changed |
None | None | High | 11 | |
CVE-2022-21439 | Oracle Solaris | Kernel | None | No | 4.2 | Local | Low | High | Required | Un- changed |
None | None | High | 10, 11 | |
CVE-2022-21563 | Oracle ZFS Storage Appliance Kit | Core | None | No | 3.4 | Local | Low | High | None | Un- changed |
None | Low | Low | 8.8 |
This Critical Patch Update contains 1 new security patch for Oracle Utilities Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-36518 | Oracle Utilities Framework | General (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.5.0.0.0 |
This Critical Patch Update contains 2 new security patches for Oracle Virtualization. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2022-21571 | Oracle VM VirtualBox | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | Prior to 6.1.36 | |
CVE-2022-21554 | Oracle VM VirtualBox | Core | None | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | Prior to 6.1.36 |