Refine your search
52 vulnerabilities found for PeopleSoft by Oracle
CERTFR-2025-AVI-0602
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.60 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Human Resources version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.61 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Global Payroll Core version 9.2.52 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.62 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Global Payroll Core version 9.2.51 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools version 8.60", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM Human Resources version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.61", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM Global Payroll Core version 9.2.52", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.62", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM Global Payroll Core version 9.2.51", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-30747", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30747" }, { "name": "CVE-2025-50062", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50062" }, { "name": "CVE-2025-24970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2024-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26143" }, { "name": "CVE-2025-30748", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30748" }, { "name": "CVE-2025-23085", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085" }, { "name": "CVE-2025-23083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2023-44483", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483" }, { "name": "CVE-2025-25193", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25193" }, { "name": "CVE-2025-23084", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084" } ], "initial_release_date": "2025-07-18T00:00:00", "last_revision_date": "2025-07-18T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0602", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Oracle PeopleSoft cpujul2025", "url": "https://www.oracle.com/security-alerts/cpujul2025.html" } ] }
CERTFR-2025-AVI-0321
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.60 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CC Common Application Objects version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.61 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.62 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Talent Acquisition Manager version 9.2 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools version 8.60", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CC Common Application Objects version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.61", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.62", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM Talent Acquisition Manager version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-30735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30735" }, { "name": "CVE-2025-30713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30713" }, { "name": "CVE-2025-30697", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30697" }, { "name": "CVE-2023-52428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428" } ], "initial_release_date": "2025-04-16T00:00:00", "last_revision_date": "2025-04-16T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0321", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": "2025-04-15", "title": "Bulletin de s\u00e9curit\u00e9 Oracle PeopleSoft cpuapr2025", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ] }
CERTFR-2025-AVI-0055
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.60 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CC Common Application Objects version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.61 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise SCM Purchasing version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise FIN Cash Management version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise FIN eSettlements version 9.2 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools version 8.60", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CC Common Application Objects version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.61", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise SCM Purchasing version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise FIN Cash Management version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise FIN eSettlements version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-21562", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21562" }, { "name": "CVE-2024-36138", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36138" }, { "name": "CVE-2024-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020" }, { "name": "CVE-2024-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891" }, { "name": "CVE-2024-28849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28849" }, { "name": "CVE-2020-22218", "url": "https://www.cve.org/CVERecord?id=CVE-2020-22218" }, { "name": "CVE-2024-6232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232" }, { "name": "CVE-2025-21537", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21537" }, { "name": "CVE-2024-27280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27280" }, { "name": "CVE-2024-29025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025" }, { "name": "CVE-2024-4030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2024-22019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22019" }, { "name": "CVE-2025-21561", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21561" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2024-37372", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37372" }, { "name": "CVE-2025-21545", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21545" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2025-21539", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21539" }, { "name": "CVE-2024-27281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27281" }, { "name": "CVE-2024-7592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592" }, { "name": "CVE-2024-22018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22018" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2024-0397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2025-21530", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21530" }, { "name": "CVE-2024-27282", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27282" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2024-4032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032" }, { "name": "CVE-2024-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511" }, { "name": "CVE-2025-21563", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21563" }, { "name": "CVE-2024-36137", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36137" } ], "initial_release_date": "2025-01-22T00:00:00", "last_revision_date": "2025-01-22T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0055", "revisions": [ { "description": "Version initiale", "revision_date": "2025-01-22T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": "2025-01-21", "title": "Bulletin de s\u00e9curit\u00e9 Oracle PeopleSoft cpujan2025", "url": "https://www.oracle.com/security-alerts/cpujan2025.html" } ] }
CERTFR-2024-AVI-0885
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise CC Common Application Objects version 9.2 | ||
Oracle | PeopleSoft | Oracle Enterprise Manager for Peoplesoft version 13.5.1.1.0 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Global Payroll Core versions 9.2.48 à 9.2.50 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise ELM Enterprise Learning Management version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools versions 8.59 à 8.61 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise FIN Expenses version 9.2 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise CC Common Application Objects version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Enterprise Manager for Peoplesoft version 13.5.1.1.0", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM Global Payroll Core versions 9.2.48 \u00e0 9.2.50", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise ELM Enterprise Learning Management version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools versions 8.59 \u00e0 8.61", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise FIN Expenses version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-0232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0232" }, { "name": "CVE-2024-21255", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21255" }, { "name": "CVE-2024-21283", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21283" }, { "name": "CVE-2024-21264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21264" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2024-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450" }, { "name": "CVE-2024-21202", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21202" }, { "name": "CVE-2024-21214", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21214" }, { "name": "CVE-2024-21286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21286" }, { "name": "CVE-2024-26130", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26130" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2024-21249", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21249" }, { "name": "CVE-2023-44483", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483" }, { "name": "CVE-2023-49083", "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083" }, { "name": "CVE-2023-5752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-6597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597" } ], "initial_release_date": "2024-10-16T00:00:00", "last_revision_date": "2024-10-16T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0885", "revisions": [ { "description": "Version initiale", "revision_date": "2024-10-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": "2024-10-15", "title": "Bulletin de s\u00e9curit\u00e9 Oracle PeopleSoft cpuoct2024", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ] }
CERTFR-2024-AVI-0596
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Shared Components version 9.2 sans les derniers correctifs de sécurité | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Human Resources version 9.2 sans les derniers correctifs de sécurité | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools versions 8.59, 8.60 et 8.61 sans les derniers correctifs de sécurité |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise HCM Shared Components version 9.2 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM Human Resources version 9.2 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools versions 8.59, 8.60 et 8.61 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-0232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0232" }, { "name": "CVE-2024-21180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21180" }, { "name": "CVE-2024-21158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21158" }, { "name": "CVE-2024-26308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2024-21122", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21122" }, { "name": "CVE-2024-21154", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21154" }, { "name": "CVE-2023-42503", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42503" }, { "name": "CVE-2024-21178", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21178" }, { "name": "CVE-2023-28756", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28756" } ], "initial_release_date": "2024-07-17T00:00:00", "last_revision_date": "2024-07-17T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0596", "revisions": [ { "description": "Version initiale", "revision_date": "2024-07-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": "2024-07-16", "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024verbose", "url": "https://www.oracle.com/security-alerts/cpujul2024verbose.html#PS" }, { "published_at": "2024-07-16", "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixPS" } ] }
CERTFR-2024-AVI-0325
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Benefits Administration version 9.2 sans les derniers correctifs de sécurité | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CRM Client Management version 9.2 sans les derniers correctifs de sécurité | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools versions antérieures ou égales à 8.61 sans les derniers correctifs de sécurité |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise HCM Benefits Administration version 9.2 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CRM Client Management version 9.2 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools versions ant\u00e9rieures ou \u00e9gales \u00e0 8.61 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2022-24613", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24613" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2023-46219", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219" }, { "name": "CVE-2021-37533", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37533" }, { "name": "CVE-2023-4043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4043" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2024-21065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21065" }, { "name": "CVE-2024-21070", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21070" }, { "name": "CVE-2024-21063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21063" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2023-1255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255" }, { "name": "CVE-2023-44483", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483" }, { "name": "CVE-2024-21097", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21097" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2023-38039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38039" }, { "name": "CVE-2024-0853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0853" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2022-24614", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24614" }, { "name": "CVE-2023-38545", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545" } ], "initial_release_date": "2024-04-18T00:00:00", "last_revision_date": "2024-04-18T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0325", "revisions": [ { "description": "Version initiale", "revision_date": "2024-04-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2024verbose du 16 avril 2024", "url": "https://www.oracle.com/security-alerts/cpuapr2024verbose.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2024 du 16 avril 2024", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html" } ] }
CERTFR-2024-AVI-0047
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools versions 8.59, 8.60 et 8.61 sans les derniers correctifs de sécurité |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools versions 8.59, 8.60 et 8.61 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-5072", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5072" }, { "name": "CVE-2023-44483", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483" }, { "name": "CVE-2023-2976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976" } ], "initial_release_date": "2024-01-17T00:00:00", "last_revision_date": "2024-01-17T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0047", "revisions": [ { "description": "Version initiale", "revision_date": "2024-01-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2024verbose du 16 janvier 2024", "url": "https://www.oracle.com/security-alerts/cpujan2024verbose.html#PS" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2024 du 16 janvier 2024", "url": "https://www.oracle.com/security-alerts/cpujan2024.html#AppendixPS" } ] }
CERTFR-2023-AVI-0864
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools versions 8.59 et 8.60 sans les derniers correctifs de sécurité | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Global Payroll Switzerland et Enterprise CC Common Application Objects version 9.2 sans les derniers correctifs de sécurité |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools versions 8.59 et 8.60 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM Global Payroll Switzerland et Enterprise CC Common Application Objects version 9.2 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-22080", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22080" }, { "name": "CVE-2022-45688", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45688" }, { "name": "CVE-2023-34462", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34462" }, { "name": "CVE-2022-42920", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42920" }, { "name": "CVE-2023-22090", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22090" } ], "initial_release_date": "2023-10-18T00:00:00", "last_revision_date": "2023-10-18T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0864", "revisions": [ { "description": "Version initiale", "revision_date": "2023-10-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2023verbose du 17 octobre 2023", "url": "https://www.oracle.com/security-alerts/cpuoct2023verbose.html#PS" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2023 du 17 octobre 2023", "url": "https://www.oracle.com/security-alerts/cpuoct2023.html" } ] }
CERTFR-2023-AVI-0564
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft versions 8.59 et 8.60 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft versions 8.59 et 8.60", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-1436", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1436" }, { "name": "CVE-2022-45061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2022-40897", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897" }, { "name": "CVE-2023-22047", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22047" }, { "name": "CVE-2023-23931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931" }, { "name": "CVE-2023-22014", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22014" }, { "name": "CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "name": "CVE-2022-23491", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23491" } ], "initial_release_date": "2023-07-19T00:00:00", "last_revision_date": "2023-07-19T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0564", "revisions": [ { "description": "Version initiale", "revision_date": "2023-07-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2023 du 18 juillet 2023", "url": "https://www.oracle.com/security-alerts/cpujul2023.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2023verbose du 18 juillet 2023", "url": "https://www.oracle.com/security-alerts/cpujul2023verbose.html#PS" } ] }
CERTFR-2023-AVI-0325
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Oracle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | Java SE | Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20 | ||
Oracle | Database Server | Oracle Database Server 19c, 21c | ||
Oracle | N/A | Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1 | ||
Oracle | PeopleSoft | Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2 | ||
Oracle | Virtualization | Oracle Virtualization versions 6.1.x antérieures à 6.1.44 | ||
Oracle | MySQL | Oracle MySQL versions 8.0.33 et antérieures | ||
Oracle | Systems | Oracle Systems versions 10, 11 | ||
Oracle | Virtualization | Oracle Virtualization versions 7.0.x antérieures à 7.0.8 | ||
Oracle | MySQL | Oracle MySQL versions 5.7.41 et antérieures | ||
Oracle | Weblogic | Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database Server 19c, 21c", "product": { "name": "Database Server", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Virtualization versions 6.1.x ant\u00e9rieures \u00e0 6.1.44", "product": { "name": "Virtualization", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle MySQL versions 8.0.33 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Systems versions 10, 11", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Virtualization versions 7.0.x ant\u00e9rieures \u00e0 7.0.8", "product": { "name": "Virtualization", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle MySQL versions 5.7.41 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0", "product": { "name": "Weblogic", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-21938", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21938" }, { "name": "CVE-2023-21916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21916" }, { "name": "CVE-2023-21985", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21985" }, { "name": "CVE-2023-21979", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21979" }, { "name": "CVE-2023-21986", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21986" }, { "name": "CVE-2020-14343", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14343" }, { "name": "CVE-2023-21954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21954" }, { "name": "CVE-2023-21940", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21940" }, { "name": "CVE-2023-21939", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21939" }, { "name": "CVE-2023-21962", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21962" }, { "name": "CVE-2022-31160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31160" }, { "name": "CVE-2022-45061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061" }, { "name": "CVE-2023-21917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21917" }, { "name": "CVE-2023-21984", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21984" }, { "name": "CVE-2023-21956", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21956" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-21945", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21945" }, { "name": "CVE-2022-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916" }, { "name": "CVE-2023-21966", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21966" }, { "name": "CVE-2023-21947", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21947" }, { "name": "CVE-2023-22002", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22002" }, { "name": "CVE-2023-21981", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21981" }, { "name": "CVE-2023-21987", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21987" }, { "name": "CVE-2023-21977", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977" }, { "name": "CVE-2023-21971", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21971" }, { "name": "CVE-2023-21999", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21999" }, { "name": "CVE-2023-21928", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21928" }, { "name": "CVE-2023-21972", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21972" }, { "name": "CVE-2023-21960", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21960" }, { "name": "CVE-2021-37533", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37533" }, { "name": "CVE-2023-21990", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21990" }, { "name": "CVE-2023-22000", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22000" }, { "name": "CVE-2023-21913", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21913" }, { "name": "CVE-2023-23918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23918" }, { "name": "CVE-2021-36090", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36090" }, { "name": "CVE-2023-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963" }, { "name": "CVE-2023-21980", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21980" }, { "name": "CVE-2020-6950", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6950" }, { "name": "CVE-2023-21996", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21996" }, { "name": "CVE-2022-40152", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40152" }, { "name": "CVE-2023-21953", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21953" }, { "name": "CVE-2023-21934", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21934" }, { "name": "CVE-2023-22003", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22003" }, { "name": "CVE-2023-21998", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21998" }, { "name": "CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "name": "CVE-2023-21946", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21946" }, { "name": "CVE-2023-21933", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21933" }, { "name": "CVE-2023-21931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21931" }, { "name": "CVE-2023-21937", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21937" }, { "name": "CVE-2022-45143", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45143" }, { "name": "CVE-2023-21896", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21896" }, { "name": "CVE-2022-43551", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551" }, { "name": "CVE-2023-21964", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21964" }, { "name": "CVE-2021-22569", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22569" }, { "name": "CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "name": "CVE-2022-43548", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43548" }, { "name": "CVE-2023-21920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21920" }, { "name": "CVE-2022-45685", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45685" }, { "name": "CVE-2023-21918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21918" }, { "name": "CVE-2023-21992", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21992" }, { "name": "CVE-2023-21911", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21911" }, { "name": "CVE-2023-21976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21976" }, { "name": "CVE-2021-31684", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31684" }, { "name": "CVE-2023-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21968" }, { "name": "CVE-2023-21991", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21991" }, { "name": "CVE-2023-21989", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21989" }, { "name": "CVE-2023-21982", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21982" }, { "name": "CVE-2023-21930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21930" }, { "name": "CVE-2023-24998", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24998" }, { "name": "CVE-2023-21935", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21935" }, { "name": "CVE-2020-25638", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25638" }, { "name": "CVE-2023-21955", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21955" }, { "name": "CVE-2023-21988", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21988" }, { "name": "CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "name": "CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "name": "CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "name": "CVE-2023-21912", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912" }, { "name": "CVE-2023-21929", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21929" }, { "name": "CVE-2023-21967", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21967" }, { "name": "CVE-2023-22001", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22001" }, { "name": "CVE-2022-41881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41881" }, { "name": "CVE-2023-21948", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21948" }, { "name": "CVE-2023-21919", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21919" } ], "initial_release_date": "2023-04-19T00:00:00", "last_revision_date": "2023-04-20T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0325", "revisions": [ { "description": "Version initiale", "revision_date": "2023-04-19T00:00:00.000000" }, { "description": "Correction coquilles.", "revision_date": "2023-04-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2023 du 18 avril 2023", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html" } ] }
CERTFR-2023-AVI-0034
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Oracle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | MySQL | MySQL Cluster versions 7.5.28 et antérieures | ||
Oracle | MySQL | MySQL Shell versions 8.0.31 et antérieures | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CC Common Application Objects version 9.2 | ||
Oracle | MySQL | MySQL Server versions 5.7.40 et antérieures | ||
Oracle | MySQL | MySQL Cluster versions 7.6.24 et antérieures | ||
Oracle | Java SE | Oracle Java SE versions 8u351, 8u351-perf, 11.0.17, 17.0.5 et 19.0.1 | ||
Oracle | MySQL | MySQL Connectors versions 8.0.31 et antérieures | ||
Oracle | Weblogic | Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0 et 14.1.1.0.0 | ||
Oracle | N/A | Oracle VM VirtualBox versions antérieures à 7.0.6 | ||
Oracle | MySQL | MySQL Workbench versions 8.0.31 et antérieures | ||
Oracle | MySQL | MySQL Enterprise Monitor versions 8.0.32 et antérieures | ||
Oracle | Database Server | Oracle Database Server versions 19c, 21c [Perl] antérieures à 5.35 | ||
Oracle | MySQL | MySQL Cluster versions 8.0.31 et antérieures | ||
Oracle | MySQL | MySQL Server versions 8.0.31 et antérieures | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CS Academic Advisement version 9.2 | ||
Oracle | N/A | Oracle VM VirtualBox versions antérieures à 6.1.42 | ||
Oracle | MySQL | MySQL Cluster versions 7.4.38 et antérieures | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools versions 8.58, 8.59 et 8.60 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "MySQL Cluster versions 7.5.28 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Shell versions 8.0.31 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CC Common Application Objects version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server versions 5.7.40 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Cluster versions 7.6.24 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Java SE versions 8u351, 8u351-perf, 11.0.17, 17.0.5 et 19.0.1", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Connectors versions 8.0.31 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0 et 14.1.1.0.0", "product": { "name": "Weblogic", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 7.0.6", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Workbench versions 8.0.31 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Enterprise Monitor versions 8.0.32 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database Server versions 19c, 21c [Perl] ant\u00e9rieures \u00e0 5.35", "product": { "name": "Database Server", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Cluster versions 8.0.31 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server versions 8.0.31 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CS Academic Advisement version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle VM VirtualBox versions ant\u00e9rieures \u00e0 6.1.42", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Cluster versions 7.4.38 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools versions 8.58, 8.59 et 8.60", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-21900", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21900" }, { "name": "CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "name": "CVE-2023-21843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21843" }, { "name": "CVE-2022-24407", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24407" }, { "name": "CVE-2023-21893", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21893" }, { "name": "CVE-2023-21877", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21877" }, { "name": "CVE-2023-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21885" }, { "name": "CVE-2022-22971", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22971" }, { "name": "CVE-2023-21865", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21865" }, { "name": "CVE-2023-21898", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21898" }, { "name": "CVE-2023-21881", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21881" }, { "name": "CVE-2023-21830", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21830" }, { "name": "CVE-2022-25647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647" }, { "name": "CVE-2023-21874", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21874" }, { "name": "CVE-2023-21838", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21838" }, { "name": "CVE-2023-21878", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21878" }, { "name": "CVE-2020-10735", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10735" }, { "name": "CVE-2022-27782", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782" }, { "name": "CVE-2023-21883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21883" }, { "name": "CVE-2022-40153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40153" }, { "name": "CVE-2022-42252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42252" }, { "name": "CVE-2022-40149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40149" }, { "name": "CVE-2023-21889", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21889" }, { "name": "CVE-2018-7489", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7489" }, { "name": "CVE-2023-21875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21875" }, { "name": "CVE-2023-21872", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21872" }, { "name": "CVE-2023-21841", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21841" }, { "name": "CVE-2022-40150", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40150" }, { "name": "CVE-2023-21864", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21864" }, { "name": "CVE-2023-21840", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840" }, { "name": "CVE-2022-1941", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1941" }, { "name": "CVE-2022-31692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31692" }, { "name": "CVE-2018-25032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032" }, { "name": "CVE-2023-21866", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21866" }, { "name": "CVE-2023-21842", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21842" }, { "name": "CVE-2023-21845", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21845" }, { "name": "CVE-2022-39429", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39429" }, { "name": "CVE-2023-21860", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21860" }, { "name": "CVE-2023-21844", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21844" }, { "name": "CVE-2022-32221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221" }, { "name": "CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "name": "CVE-2023-21871", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21871" }, { "name": "CVE-2023-21839", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21839" }, { "name": "CVE-2023-21887", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21887" }, { "name": "CVE-2023-21835", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21835" }, { "name": "CVE-2021-3737", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3737" }, { "name": "CVE-2023-21873", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21873" }, { "name": "CVE-2023-21863", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21863" }, { "name": "CVE-2023-21876", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21876" }, { "name": "CVE-2020-36242", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36242" }, { "name": "CVE-2023-21867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21867" }, { "name": "CVE-2023-21899", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21899" }, { "name": "CVE-2023-21869", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21869" }, { "name": "CVE-2022-42920", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42920" }, { "name": "CVE-2022-43548", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43548" }, { "name": "CVE-2023-21836", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21836" }, { "name": "CVE-2023-21827", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21827" }, { "name": "CVE-2023-21870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21870" }, { "name": "CVE-2022-25857", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857" }, { "name": "CVE-2023-21879", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21879" }, { "name": "CVE-2021-3918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3918" }, { "name": "CVE-2023-21882", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21882" }, { "name": "CVE-2023-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21886" }, { "name": "CVE-2023-21837", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21837" }, { "name": "CVE-2023-21831", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21831" }, { "name": "CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "name": "CVE-2022-40304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304" }, { "name": "CVE-2023-21880", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21880" }, { "name": "CVE-2022-3171", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3171" }, { "name": "CVE-2022-23219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219" }, { "name": "CVE-2023-21829", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21829" }, { "name": "CVE-2023-21884", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21884" }, { "name": "CVE-2023-21868", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21868" } ], "initial_release_date": "2023-01-18T00:00:00", "last_revision_date": "2023-01-18T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0034", "revisions": [ { "description": "Version initiale", "revision_date": "2023-01-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2023 du 18 janvier 2023", "url": "https://www.oracle.com/security-alerts/cpujan2023.html" } ] }
CERTFR-2022-AVI-932
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools versions 8.58, 8.59, 8.60 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise Common Components version 9.2 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools versions 8.58, 8.59, 8.60", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise Common Components version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-25647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647" }, { "name": "CVE-2022-21602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21602" }, { "name": "CVE-2022-24823", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24823" }, { "name": "CVE-2022-21639", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21639" }, { "name": "CVE-2022-39406", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39406" }, { "name": "CVE-2022-39407", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39407" }, { "name": "CVE-2022-2097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097" }, { "name": "CVE-2021-22144", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22144" } ], "initial_release_date": "2022-10-19T00:00:00", "last_revision_date": "2022-10-19T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-932", "revisions": [ { "description": "Version initiale", "revision_date": "2022-10-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2022 du 18 octobre 2022", "url": "https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixPS" } ] }
CERTFR-2022-AVI-658
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft version 8.59 | ||
Oracle | PeopleSoft | PeopleSoft version 8.58 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft version 8.59", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft version 8.58", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-21512", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21512" }, { "name": "CVE-2021-41182", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41182" }, { "name": "CVE-2022-21543", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21543" }, { "name": "CVE-2022-24728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24728" }, { "name": "CVE-2021-41184", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41184" }, { "name": "CVE-2022-21520", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21520" }, { "name": "CVE-2021-41183", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41183" }, { "name": "CVE-2018-25032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032" }, { "name": "CVE-2022-24729", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24729" }, { "name": "CVE-2022-21521", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21521" }, { "name": "CVE-2022-23437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23437" }, { "name": "CVE-2021-31684", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31684" }, { "name": "CVE-2020-36518", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36518" }, { "name": "CVE-2020-7656", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7656" } ], "initial_release_date": "2022-07-20T00:00:00", "last_revision_date": "2022-07-20T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-658", "revisions": [ { "description": "Version initiale", "revision_date": "2022-07-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2022 du 19 juillet 2022", "url": "https://www.oracle.com/security-alerts/cpujul2022.html#AppendixPS" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2022verbose du 19 juillet 2022", "url": "https://www.oracle.com/security-alerts/cpujul2022verbose.html#PS" } ] }
CERTFR-2022-AVI-366
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PRTL Interaction Hub version 9.1 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.58 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.59 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CS Academic Advisement version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise FIN Cash Management version 9.2 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PRTL Interaction Hub version 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.58", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.59", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CS Academic Advisement version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise FIN Cash Management version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-21470", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21470" }, { "name": "CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "name": "CVE-2022-21447", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21447" }, { "name": "CVE-2021-4160", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4160" }, { "name": "CVE-2022-21458", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21458" }, { "name": "CVE-2021-43797", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43797" }, { "name": "CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "name": "CVE-2020-8908", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908" }, { "name": "CVE-2021-44533", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44533" }, { "name": "CVE-2021-44832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832" }, { "name": "CVE-2021-41165", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41165" }, { "name": "CVE-2022-21450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21450" }, { "name": "CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "name": "CVE-2022-21481", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21481" } ], "initial_release_date": "2022-04-20T00:00:00", "last_revision_date": "2022-04-20T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-366", "revisions": [ { "description": "Version initiale", "revision_date": "2022-04-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle verbose cpuapr2022 du 19 avril 2022", "url": "https://www.oracle.com/security-alerts/cpuapr2022verbose.html#PS" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2022 du 19 avril 2022", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixPS" } ] }
CERTFR-2022-AVI-053
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise CS SA Integration Pack versions 9.0, 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools versions 8.57, 8.58, 8.59 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise CS SA Integration Pack versions 9.0, 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools versions 8.57, 8.58, 8.59", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-21272", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21272" }, { "name": "CVE-2022-21300", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21300" }, { "name": "CVE-2021-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337" }, { "name": "CVE-2021-2351", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2351" }, { "name": "CVE-2022-21369", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21369" }, { "name": "CVE-2021-22946", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22946" }, { "name": "CVE-2021-37137", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37137" }, { "name": "CVE-2022-21359", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21359" }, { "name": "CVE-2022-21345", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21345" }, { "name": "CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "name": "CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "name": "CVE-2022-21364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21364" }, { "name": "CVE-2021-37695", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37695" } ], "initial_release_date": "2022-01-19T00:00:00", "last_revision_date": "2022-01-19T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-053", "revisions": [ { "description": "Version initiale", "revision_date": "2022-01-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2022.html du 18 janvier 2022", "url": "https://www.oracle.com/security-alerts/cpujan2022.html#AppendixPS" } ] }
CERTFR-2021-AVI-804
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.57 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CC Common Application Objects version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise SCM version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.58 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.59 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CS SA Integration Pack version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CS Academic Advisement version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CS SA Integration Pack version 9.0 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise CS Student Records version 9.2 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools version 8.57", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CC Common Application Objects version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise SCM version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.58", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools version 8.59", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CS SA Integration Pack version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CS Academic Advisement version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CS SA Integration Pack version 9.0", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise CS Student Records version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-29425", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29425" }, { "name": "CVE-2021-27906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27906" }, { "name": "CVE-2021-35595", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35595" }, { "name": "CVE-2021-35541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35541" }, { "name": "CVE-2020-13956", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13956" }, { "name": "CVE-2021-36090", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36090" }, { "name": "CVE-2021-35609", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35609" }, { "name": "CVE-2021-35571", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35571" }, { "name": "CVE-2021-23926", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23926" }, { "name": "CVE-2021-35553", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35553" }, { "name": "CVE-2021-35601", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35601" }, { "name": "CVE-2021-35606", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35606" }, { "name": "CVE-2019-12415", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12415" }, { "name": "CVE-2021-28363", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28363" }, { "name": "CVE-2021-35543", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35543" }, { "name": "CVE-2021-35568", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35568" }, { "name": "CVE-2020-1967", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1967" } ], "initial_release_date": "2021-10-20T00:00:00", "last_revision_date": "2021-10-20T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-804", "revisions": [ { "description": "Version initiale", "revision_date": "2021-10-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2021 du 19 octobre 2021", "url": "https://www.oracle.com/security-alerts/cpuoct2021verbose.html#PS" } ] }
CERTFR-2021-AVI-559
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | Oracle PeopleSoft versions 8.57, 8.58. 8.59 | ||
Oracle | PeopleSoft | Oracle PeopleSoft versions 9.0, 9.2 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle PeopleSoft versions 8.57, 8.58. 8.59", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft versions 9.0, 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-13956", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13956" }, { "name": "CVE-2021-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2455" }, { "name": "CVE-2020-7017", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7017" }, { "name": "CVE-2019-17195", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17195" }, { "name": "CVE-2021-2421", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2421" }, { "name": "CVE-2021-3450", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3450" }, { "name": "CVE-2021-2407", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2407" }, { "name": "CVE-2021-2404", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2404" }, { "name": "CVE-2021-27568", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27568" }, { "name": "CVE-2021-2377", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2377" }, { "name": "CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "name": "CVE-2020-8908", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908" }, { "name": "CVE-2021-21290", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21290" }, { "name": "CVE-2021-2408", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2408" } ], "initial_release_date": "2021-07-21T00:00:00", "last_revision_date": "2021-07-21T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-559", "revisions": [ { "description": "Version initiale", "revision_date": "2021-07-21T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2021 du 20 juillet 2021", "url": "https://www.oracle.com/security-alerts/cpujul2021.html" } ] }
CERTFR-2015-AVI-444
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle Peoplesoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools, version 8.53 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise FIN Expenses, version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM, version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HCM Talent Acquistion Managment, version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise FSCM, version 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools, version 8.54 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools, version 8.53", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise FIN Expenses, version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM, version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HCM Talent Acquistion Managment, version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise FSCM, version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools, version 8.54", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2015-4828", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4828" }, { "name": "CVE-2015-1793", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1793" }, { "name": "CVE-2015-1791", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1791" }, { "name": "CVE-2015-4850", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4850" }, { "name": "CVE-2015-4876", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4876" }, { "name": "CVE-2015-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1789" }, { "name": "CVE-2015-4818", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4818" }, { "name": "CVE-2015-1788", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1788" }, { "name": "CVE-2015-1792", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1792" }, { "name": "CVE-2015-4804", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4804" }, { "name": "CVE-2015-4825", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4825" }, { "name": "CVE-2015-4887", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4887" }, { "name": "CVE-2015-1790", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1790" } ], "initial_release_date": "2015-10-21T00:00:00", "last_revision_date": "2015-10-21T00:00:00", "links": [], "reference": "CERTFR-2015-AVI-444", "revisions": [ { "description": "version initiale.", "revision_date": "2015-10-21T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Peoplesoft\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Peoplesoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle du 20 octobre 2015", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" } ] }
CERTFR-2015-AVI-171
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | Oracle PeopleSoft versions 8.54 et antérieures | ||
Oracle | PeopleSoft | Oracle PeopleSoft versions 9.1 et antérieures | ||
Oracle | PeopleSoft | Oracle PeopleSoft versions 9.2 et antérieures |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle PeopleSoft versions 8.54 et ant\u00e9rieures", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft versions 9.1 et ant\u00e9rieures", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft versions 9.2 et ant\u00e9rieures", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2015-0496", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0496" }, { "name": "CVE-2015-0472", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0472" }, { "name": "CVE-2015-0497", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0497" }, { "name": "CVE-2015-0485", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0485" }, { "name": "CVE-2015-0453", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0453" }, { "name": "CVE-2015-0487", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0487" } ], "initial_release_date": "2015-04-15T00:00:00", "last_revision_date": "2015-04-15T00:00:00", "links": [], "reference": "CERTFR-2015-AVI-171", "revisions": [ { "description": "version initiale.", "revision_date": "2015-04-15T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle PeopleSoft\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle du 14 avril 2015", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" } ] }
CERTFR-2014-AVI-316
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise SCM Purchasing, versions 9.1, 9.2 | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise ELS Enterprise Learning Management, versions 9.1, 9.2 | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise FIN Install, versions 9.1, 9.2 | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise PT PeopleTools, versions 8.52, 8.53 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle PeopleSoft Enterprise SCM Purchasing, versions 9.1, 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise ELS Enterprise Learning Management, versions 9.1, 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise FIN Install, versions 9.1, 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise PT PeopleTools, versions 8.52, 8.53", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2014-2456", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2456" }, { "name": "CVE-2014-2495", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2495" }, { "name": "CVE-2014-4226", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4226" }, { "name": "CVE-2014-4204", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4204" }, { "name": "CVE-2014-2496", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2496" } ], "initial_release_date": "2014-07-16T00:00:00", "last_revision_date": "2014-07-16T00:00:00", "links": [], "reference": "CERTFR-2014-AVI-316", "revisions": [ { "description": "version initiale.", "revision_date": "2014-07-16T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle PeopleSoft\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle du 16 juillet 2014", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" } ] }
CERTFR-2014-AVI-184
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise version 8.52 | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise version 8.53 | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise version 9.0 | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise version 9.2 | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise version 9.1 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle PeopleSoft Enterprise version 8.52", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise version 8.53", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise version 9.0", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise version 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise version 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2014-2429", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2429" }, { "name": "CVE-2014-2448", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2448" }, { "name": "CVE-2014-2446", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2446" }, { "name": "CVE-2014-2449", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2449" }, { "name": "CVE-2014-2437", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2437" }, { "name": "CVE-2014-2447", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2447" }, { "name": "CVE-2014-2443", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2443" }, { "name": "CVE-2014-2433", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2433" } ], "initial_release_date": "2014-04-16T00:00:00", "last_revision_date": "2014-04-16T00:00:00", "links": [], "reference": "CERTFR-2014-AVI-184", "revisions": [ { "description": "version initiale.", "revision_date": "2014-04-16T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eOracle PeopleSoft\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle CPUApr2014 du 14 avril 2014", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html#AppendixPS" } ] }
CERTA-2014-AVI-026
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle People Soft Products. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | Oracle PeopleSoft Products versions 8.53 et antérieures | ||
Oracle | PeopleSoft | Oracle PeopleSoft Products versions 9.2 et antérieures |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle PeopleSoft Products versions 8.53 et ant\u00e9rieures", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Products versions 9.2 et ant\u00e9rieures", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2014-0396", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0396" }, { "name": "CVE-2014-0394", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0394" }, { "name": "CVE-2014-0392", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0392" }, { "name": "CVE-2014-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0438" }, { "name": "CVE-2014-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0445" }, { "name": "CVE-2013-5886", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5886" }, { "name": "CVE-2014-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0440" }, { "name": "CVE-2014-0381", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0381" }, { "name": "CVE-2014-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0441" }, { "name": "CVE-2014-0439", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0439" }, { "name": "CVE-2013-5909", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5909" }, { "name": "CVE-2014-0388", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0388" }, { "name": "CVE-2014-0380", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0380" }, { "name": "CVE-2014-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0425" }, { "name": "CVE-2014-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0395" }, { "name": "CVE-2014-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0443" }, { "name": "CVE-2013-5873", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5873" } ], "initial_release_date": "2014-01-15T00:00:00", "last_revision_date": "2014-01-15T00:00:00", "links": [], "reference": "CERTA-2014-AVI-026", "revisions": [ { "description": "version initiale.", "revision_date": "2014-01-15T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle People Soft Products\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle People Soft Products", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2014 du 14 janvier 2014", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" } ] }
CERTA-2013-AVI-579
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle PeopleSoft Enterprise. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise HRMS 9.1 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HRMS 9.2 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools 8.53 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools 8.51 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools 8.52 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise HRMS 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HRMS 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools 8.53", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools 8.51", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PeopleTools 8.52", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2013-3785", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3785" }, { "name": "CVE-2013-5779", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5779" }, { "name": "CVE-2013-5765", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5765" }, { "name": "CVE-2013-5794", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5794" }, { "name": "CVE-2013-3835", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3835" }, { "name": "CVE-2013-5847", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5847" }, { "name": "CVE-2013-5841", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5841" }, { "name": "CVE-2013-5836", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5836" } ], "initial_release_date": "2013-10-16T00:00:00", "last_revision_date": "2013-10-16T00:00:00", "links": [], "reference": "CERTA-2013-AVI-579", "revisions": [ { "description": "version initiale.", "revision_date": "2013-10-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle PeopleSoft Enterprise\u003c/span\u003e. Elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft Enterprise", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle du 15 octobre 2013", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" } ] }
CERTA-2013-AVI-426
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle PeopleSoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PT PeopleTools version 8.52 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PT PeopleTools version 8.53 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PT PeopleTools version PeopleTools 8.52 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PRTL Interaction Hub version 9.1 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PT PeopleTools version 8.51 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HRMS Time et Labor version 9.1 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PT PeopleTools version Portal 9.1 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PT PeopleTools version 8.52", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PT PeopleTools version 8.53", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PT PeopleTools version PeopleTools 8.52", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PRTL Interaction Hub version 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PT PeopleTools version 8.51", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HRMS Time et Labor version 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PT PeopleTools version Portal 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2013-3768", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3768" }, { "name": "CVE-2013-3761", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3761" }, { "name": "CVE-2013-3759", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3759" }, { "name": "CVE-2013-3780", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3780" }, { "name": "CVE-2013-3818", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3818" }, { "name": "CVE-2013-3821", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3821" }, { "name": "CVE-2013-3819", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3819" }, { "name": "CVE-2013-3820", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3820" }, { "name": "CVE-2013-3800", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3800" }, { "name": "CVE-2013-3784", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3784" } ], "initial_release_date": "2013-07-17T00:00:00", "last_revision_date": "2013-07-17T00:00:00", "links": [], "reference": "CERTA-2013-AVI-426", "revisions": [ { "description": "version initiale.", "revision_date": "2013-07-17T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle PeopleSoft\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle CPUJul2013 du 16 juillet 2013", "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html" } ] }
CERTA-2013-AVI-248
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle Applications. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | Oracle PeopleSoft HRMS version 9.1 | ||
Oracle | PeopleSoft | Oracle PeopleSoft PeopleTools version 8.52 | ||
Oracle | N/A | Oracle Siebel CRM version 8.2.2 | ||
Oracle | N/A | Oracle E-Business Suite 12i version 12.1.1 | ||
Oracle | N/A | Oracle E-Business Suite 11i version 11.5.10.2 | ||
Oracle | PeopleSoft | Oracle PeopleSoft PeopleTools version 8.53 | ||
Oracle | N/A | Oracle E-Business Suite 12i version 12.1.2 | ||
Oracle | N/A | Oracle Transportation Management version 5.5.05 | ||
Oracle | N/A | Oracle Siebel CRM version 8.1.1 | ||
Oracle | PeopleSoft | Oracle PeopleSoft PeopleTools version 8.51 | ||
Oracle | N/A | Oracle E-Business Suite 12i version 12.1.3 | ||
Oracle | N/A | Oracle E-Business Suite 12i version 12.0.6 | ||
Oracle | N/A | Oracle Agile EDM version 6.1.2.2 | ||
Oracle | N/A | Oracle Agile EDM version 6.1.2.0 | ||
Oracle | N/A | Oracle Transportation Management version 6.2 | ||
Oracle | N/A | Oracle Agile EDM version 6.1.1.0 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle PeopleSoft HRMS version 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft PeopleTools version 8.52", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Siebel CRM version 8.2.2", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite 12i version 12.1.1", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite 11i version 11.5.10.2", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft PeopleTools version 8.53", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite 12i version 12.1.2", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Transportation Management version 5.5.05", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Siebel CRM version 8.1.1", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft PeopleTools version 8.51", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite 12i version 12.1.3", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite 12i version 12.0.6", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Agile EDM version 6.1.2.2", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Agile EDM version 6.1.2.0", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Transportation Management version 6.2", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Agile EDM version 6.1.1.0", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2013-1524", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1524" }, { "name": "CVE-2013-1551", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1551" }, { "name": "CVE-2013-1510", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1510" }, { "name": "CVE-2013-0416", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0416" }, { "name": "CVE-2013-2396", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2396" }, { "name": "CVE-2013-0410", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0410" }, { "name": "CVE-2013-2401", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2401" }, { "name": "CVE-2013-1513", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1513" }, { "name": "CVE-2013-2410", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2410" }, { "name": "CVE-2013-2409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2409" }, { "name": "CVE-2013-2374", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2374" }, { "name": "CVE-2013-1536", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1536" }, { "name": "CVE-2013-2403", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2403" }, { "name": "CVE-2013-2406", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2406" }, { "name": "CVE-2013-1528", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1528" }, { "name": "CVE-2013-2404", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2404" }, { "name": "CVE-2013-1527", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1527" }, { "name": "CVE-2013-2441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2441" }, { "name": "CVE-2013-2399", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2399" }, { "name": "CVE-2013-1543", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1543" }, { "name": "CVE-2013-1517", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1517" }, { "name": "CVE-2013-1501", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1501" }, { "name": "CVE-2013-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1550" }, { "name": "CVE-2013-2408", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2408" }, { "name": "CVE-2013-2413", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2413" }, { "name": "CVE-2013-2402", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2402" }, { "name": "CVE-2013-2388", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2388" }, { "name": "CVE-2013-2398", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2398" } ], "initial_release_date": "2013-04-17T00:00:00", "last_revision_date": "2013-04-17T00:00:00", "links": [], "reference": "CERTA-2013-AVI-248", "revisions": [ { "description": "version initiale.", "revision_date": "2013-04-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Applications\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Applications", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle CPUApr2013 du 16 avril 2013", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html" } ] }
CERTA-2013-AVI-038
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle PeopleSoft Products. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à l'intégrité et à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise HRMS Human Resources Version 9.1 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PT PeopleTools Version 8.52 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HRMS Candidate Gateway Version 9.0 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise HRMS Candidate Gateway Version 9.1 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise PT PeopleTools Version 8.51 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise HRMS Human Resources Version 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PT PeopleTools Version 8.52", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HRMS Candidate Gateway Version 9.0", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise HRMS Candidate Gateway Version 9.1", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise PT PeopleTools Version 8.51", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-1755", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1755" }, { "name": "CVE-2013-0356", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0356" }, { "name": "CVE-2013-0394", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0394" }, { "name": "CVE-2013-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0395" }, { "name": "CVE-2012-3192", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3192" }, { "name": "CVE-2013-0357", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0357" }, { "name": "CVE-2012-5059", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5059" }, { "name": "CVE-2013-0387", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0387" }, { "name": "CVE-2013-0392", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0392" }, { "name": "CVE-2013-0388", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0388" }, { "name": "CVE-2013-0369", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0369" }, { "name": "CVE-2013-0391", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0391" } ], "initial_release_date": "2013-01-16T00:00:00", "last_revision_date": "2013-01-16T00:00:00", "links": [], "reference": "CERTA-2013-AVI-038", "revisions": [ { "description": "version initiale.", "revision_date": "2013-01-16T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle PeopleSoft Products\u003c/span\u003e. Certaines d\u0027entre\nelles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\net \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft Products", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle CPUJan2013 du 15 janvier 2013", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" } ] }
CERTA-2012-AVI-582
Vulnerability from certfr_avis
Neuf vulnérabilités ont été corrigées dans les produits Oracle People Soft. Elles concernent des contournements de la politique de sécurité et des atteintes à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools 8.50, 8.51, 8.52 | ||
Oracle | PeopleSoft | PeopleSoft Enterprise Campus Solutions 9.0 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PeopleSoft Enterprise PeopleTools 8.50, 8.51, 8.52", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "PeopleSoft Enterprise Campus Solutions 9.0", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-3198", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3198" }, { "name": "CVE-2012-3191", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3191" }, { "name": "CVE-2012-3201", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3201" }, { "name": "CVE-2012-3182", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3182" }, { "name": "CVE-2012-3188", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3188" }, { "name": "CVE-2012-3176", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3176" }, { "name": "CVE-2012-3179", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3179" }, { "name": "CVE-2012-3181", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3181" }, { "name": "CVE-2012-3195", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3195" } ], "initial_release_date": "2012-10-17T00:00:00", "last_revision_date": "2012-10-17T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2012-1515893 du 16 octobre 2012 :", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html" } ], "reference": "CERTA-2012-AVI-582", "revisions": [ { "description": "version initiale.", "revision_date": "2012-10-17T00:00:00.000000" } ], "risks": [ { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Neuf vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eOracle People Soft\u003c/span\u003e. Elles concernent des\ncontournements de la politique de s\u00e9curit\u00e9 et des atteintes \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle People Soft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle du 16 octobre 2012", "url": null } ] }
CERTA-2012-AVI-393
Vulnerability from certfr_avis
Soixante-dix sept vulnérabilités ont été corrigées dans les produits Oracle. Elles concernent de nombreux composants et peuvent pour certaines être exploitées à distance. Le CERTA recommande de mettre à jour vos produits Oracle dès que possible.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | N/A | Oracle E-Business Suite Release 12 versions 12.0.4, 12.0.6, 12.1.1, 12.1.2 et 12.1.3 ; | ||
Oracle | N/A | Oracle Identity Management 10g version 10.1.4.3 ; | ||
Oracle | N/A | Oracle Sun Product Suite ; | ||
Oracle | N/A | Oracle Application Server 10g Release 3 version 10.1.3.5 ; | ||
Oracle | N/A | Oracle Database 10g Release 2 versions 10.2.0.3, 10.2.0.4 et 10.2.0.5 ; | ||
Oracle | N/A | Oracle Siebel CRM versions 8.1.1 et 8.2.2 ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise HRMS versions 9.0 et 9.1 ; | ||
Oracle | N/A | Oracle Transportation Management versions 5.5.06, 6.0, 6.1 et 6.2 ; | ||
Oracle | N/A | Oracle JRockit versions R28.2.3 et antérieures, R27.7.2 et antérieures ; | ||
Oracle | N/A | Enterprise Manager Grid Control 11g Release 1 version 11.1.0.1 ; | ||
Oracle | N/A | Oracle Secure Backup versions 10.3.0.3 et 10.4.0.1 ; | ||
Oracle | N/A | Oracle AutoVue versions 20.0.2 et 20.1 ; | ||
Oracle | N/A | Oracle Outside In Technology versions 8.3.5 et 8.3.7; | ||
Oracle | N/A | Enterprise Manager Plugin pour Database 12c Release 1 versions 12.1.0.1 et 12.1.0.2 ; | ||
Oracle | N/A | Oracle Fusion Middleware 11g Release 2 version 11.1.2.0 ; | ||
Oracle | N/A | Oracle Map Viewer versions 10.1.3.1, 11.1.1.5 et 11.1.1.6 ; | ||
Oracle | N/A | Oracle Clinical Remote Data Capture Option versions 4.6, 4.6.2 et 4.6.3 ; | ||
Oracle | N/A | Oracle Database 11g Release 2 versions 11.2.0.2 et 11.2.0.3 ; | ||
Oracle | N/A | Enterprise Manager Grid Control 10g Release 1 version 10.2.0.5 ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise PeopleTools versions 8.50, 8.51 et 8.52 ; | ||
Oracle | N/A | Oracle E-Business Suite Release 11i version 11.5.10.2 ; | ||
Oracle | N/A | Hyperion BI+ version 11.1.1.x ; | ||
Oracle | N/A | Oracle Fusion Middleware 11g Release 1 versions 11.1.1.5 et 11.1.1.6 ; | ||
Oracle | N/A | Oracle Database 11g Release 1 version 11.1.0.7 ; | ||
Oracle | MySQL | Oracle MySQL Server versions 5.1 et 5.5. |
Title | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle E-Business Suite Release 12 versions 12.0.4, 12.0.6, 12.1.1, 12.1.2 et 12.1.3 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Identity Management 10g version 10.1.4.3 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Sun Product Suite ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Application Server 10g Release 3 version 10.1.3.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 10g Release 2 versions 10.2.0.3, 10.2.0.4 et 10.2.0.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Siebel CRM versions 8.1.1 et 8.2.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise HRMS versions 9.0 et 9.1 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Transportation Management versions 5.5.06, 6.0, 6.1 et 6.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle JRockit versions R28.2.3 et ant\u00e9rieures, R27.7.2 et ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Enterprise Manager Grid Control 11g Release 1 version 11.1.0.1 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Secure Backup versions 10.3.0.3 et 10.4.0.1 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle AutoVue versions 20.0.2 et 20.1 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Outside In Technology versions 8.3.5 et 8.3.7;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Enterprise Manager Plugin pour Database 12c Release 1 versions 12.1.0.1 et 12.1.0.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Fusion Middleware 11g Release 2 version 11.1.2.0 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Map Viewer versions 10.1.3.1, 11.1.1.5 et 11.1.1.6 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Clinical Remote Data Capture Option versions 4.6, 4.6.2 et 4.6.3 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 11g Release 2 versions 11.2.0.2 et 11.2.0.3 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Enterprise Manager Grid Control 10g Release 1 version 10.2.0.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise PeopleTools versions 8.50, 8.51 et 8.52 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite Release 11i version 11.5.10.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Hyperion BI+ version 11.1.1.x ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Fusion Middleware 11g Release 1 versions 11.1.1.5 et 11.1.1.6 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 11g Release 1 version 11.1.0.7 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle MySQL Server versions 5.1 et 5.5.", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-3118", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3118" }, { "name": "CVE-2012-1770", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1770" }, { "name": "CVE-2011-3192", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3192" }, { "name": "CVE-2012-1773", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1773" }, { "name": "CVE-2012-3124", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3124" }, { "name": "CVE-2012-1735", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1735" }, { "name": "CVE-2012-3110", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3110" }, { "name": "CVE-2012-1736", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1736" }, { "name": "CVE-2012-1759", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1759" }, { "name": "CVE-2012-1767", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1767" }, { "name": "CVE-2012-1766", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1766" }, { "name": "CVE-2012-1754", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1754" }, { "name": "CVE-2012-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3114" }, { "name": "CVE-2012-1730", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1730" }, { "name": "CVE-2012-1739", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1739" }, { "name": "CVE-2012-1765", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1765" }, { "name": "CVE-2012-1727", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1727" }, { "name": "CVE-2012-3115", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3115" }, { "name": "CVE-2012-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3113" }, { "name": "CVE-2012-1740", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1740" }, { "name": "CVE-2012-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3121" }, { "name": "CVE-2012-1689", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1689" }, { "name": "CVE-2012-1769", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1769" }, { "name": "CVE-2012-1768", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1768" }, { "name": "CVE-2012-1742", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1742" }, { "name": "CVE-2012-1762", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1762" }, { "name": "CVE-2012-3130", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3130" }, { "name": "CVE-2012-1732", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1732" }, { "name": "CVE-2012-3134", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3134" }, { "name": "CVE-2012-3126", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3126" }, { "name": "CVE-2012-1747", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1747" }, { "name": "CVE-2012-1733", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1733" }, { "name": "CVE-2012-3117", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3117" }, { "name": "CVE-2012-1744", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1744" }, { "name": "CVE-2012-1760", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1760" }, { "name": "CVE-2012-1772", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1772" }, { "name": "CVE-2012-3106", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3106" }, { "name": "CVE-2011-3562", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3562" }, { "name": "CVE-2012-3128", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3128" }, { "name": "CVE-2012-1715", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1715" }, { "name": "CVE-2012-3135", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3135" }, { "name": "CVE-2012-1728", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1728" }, { "name": "CVE-2012-1757", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1757" }, { "name": "CVE-2012-1749", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1749" }, { "name": "CVE-2012-0563", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0563" }, { "name": "CVE-2012-1748", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1748" }, { "name": "CVE-2012-1687", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1687" }, { "name": "CVE-2012-1758", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1758" }, { "name": "CVE-2012-3112", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3112" }, { "name": "CVE-2012-1741", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1741" }, { "name": "CVE-2012-3109", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3109" }, { "name": "CVE-2012-1752", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1752" }, { "name": "CVE-2012-1729", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1729" }, { "name": "CVE-2012-1771", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1771" }, { "name": "CVE-2012-3131", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3131" }, { "name": "CVE-2012-0540", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0540" }, { "name": "CVE-2012-1761", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1761" }, { "name": "CVE-2011-3368", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3368" }, { "name": "CVE-2012-1738", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1738" }, { "name": "CVE-2012-3125", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3125" }, { "name": "CVE-2008-4609", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4609" }, { "name": "CVE-2012-1756", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1756" }, { "name": "CVE-2012-1737", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1737" }, { "name": "CVE-2012-1764", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1764" }, { "name": "CVE-2012-3111", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3111" }, { "name": "CVE-2012-3107", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3107" }, { "name": "CVE-2012-1753", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1753" }, { "name": "CVE-2012-3116", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3116" }, { "name": "CVE-2011-4358", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4358" }, { "name": "CVE-2011-4317", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4317" }, { "name": "CVE-2012-1734", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1734" }, { "name": "CVE-2012-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1745" }, { "name": "CVE-2001-0323", "url": "https://www.cve.org/CVERecord?id=CVE-2001-0323" }, { "name": "CVE-2011-4885", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4885" }, { "name": "CVE-2011-2699", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2699" }, { "name": "CVE-2012-3120", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3120" }, { "name": "CVE-2012-3108", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3108" }, { "name": "CVE-2012-1750", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1750" }, { "name": "CVE-2012-3127", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3127" }, { "name": "CVE-2012-1746", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1746" }, { "name": "CVE-2012-3122", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3122" }, { "name": "CVE-2012-3119", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3119" }, { "name": "CVE-2012-3129", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3129" }, { "name": "CVE-2012-3123", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3123" }, { "name": "CVE-2011-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0419" }, { "name": "CVE-2012-1743", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1743" }, { "name": "CVE-2012-1731", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1731" } ], "initial_release_date": "2012-07-18T00:00:00", "last_revision_date": "2012-07-18T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2012-392727 du 17 juillet 2012 :", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" } ], "reference": "CERTA-2012-AVI-393", "revisions": [ { "description": "version initiale.", "revision_date": "2012-07-18T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Soixante-dix sept vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits\n\u003cspan class=\"textit\"\u003eOracle\u003c/span\u003e. Elles concernent de nombreux\ncomposants et peuvent pour certaines \u00eatre exploit\u00e9es \u00e0 distance. Le\nCERTA recommande de mettre \u00e0 jour vos produits \u003cspan\nclass=\"textit\"\u003eOracle\u003c/span\u003e d\u00e8s que possible.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2012-392727 du 17 juillet 2012", "url": null } ] }
CERTA-2012-AVI-220
Vulnerability from certfr_avis
Quatre-vingt huit vulnérabilités critiques ont été corrigées par Oracle. L'exploitation des vulnérabilités peut mener à une « exécution de code arbitraire à distance ». Une seule vulnérabilité est accessible en local, les autres peuvent être exploitées depuis le réseau. Le CERTA recommande de mettre à jour vos produits Oracle dès que possible.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | N/A | Oracle AutoVue version 20.0.2 ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise FCSM, versions 9.0, 9.1 ; | ||
Oracle | N/A | Oracle FLEXCUBE Direct Banking, versions 5.0.2, 5.3.0-5.3.4, 6.0.1, 6.2.0 ; | ||
Oracle | N/A | Oracle Sun Product Suite ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise SCM, versions 9.0, 9.1 ; | ||
Oracle | N/A | Oracle Identity Manager 11g, versions 11.1.1.3, 11.1.1.5 ; | ||
Oracle | N/A | Oracle Application Server 10g Release 3, version 10.1.3.5.0 ; | ||
Oracle | N/A | Oracle Outside In Technology, versions 8.3.5, 8.3.7 ; | ||
Oracle | N/A | Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4, 10.2.0.5 ; | ||
Oracle | N/A | Oracle E-Business Suite Release 11i, version 11.5.10.2 ; | ||
Oracle | N/A | Oracle WebCenter Forms Recognition, version 10.1.3.5 ; | ||
Oracle | N/A | Oracle JDeveloper, version 10.1.3.5.0 ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise Portal version 9.1 ; | ||
Oracle | N/A | Oracle Siebel Life Sciences, versions 8.0.0, 8.1.1, 8.2.2 ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise CRM, version 9.1 ; | ||
Oracle | N/A | Oracle E-Business Suite Release 12, versions 12.0.4, 12.0.6, 12.1.1, 12.1.2, 12.1.3 ; | ||
Oracle | N/A | Oracle Database 11g Release 2, versions 11.2.0.2, 11.2.0.3 ; | ||
Oracle | N/A | Enterprise Manager Grid Control 11g Release 1, version 11.1.0.1 ; | ||
Oracle | N/A | Primavera P6 Enterprise Project Portfolio Management, versions 6.2.1, 8.0, 8.1, 8.2 ; | ||
Oracle | N/A | Oracle Database 11g Release 1, version 11.1.0.7 ; | ||
Oracle | N/A | Enterprise Manager Grid Control 10g Release 1, version 10.2.0.5 ; | ||
Oracle | N/A | Oracle JRockit versions, R28.2.2 et antérieures, R27.7.1 et antérieures ; | ||
Oracle | MySQL | Oracle MySQL Server, versions 5.1, 5.5. | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise HCM, version 9.1 ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise PeopleTools, versions 8.50, 8.51, 8.52 ; | ||
Oracle | N/A | Oracle Agile, version 6.0.0 ; | ||
Oracle | N/A | Oracle FLEXCUBE Universal Banking, versions 10.0.0-10.5.0, 11.0.0-11.4.0 ; | ||
Oracle | N/A | Oracle DB UM Connector for Oracle Identity Manager, Version 9.1.0.4 ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise HRMS, versions 8.9, 9.0, 9.1 ; | ||
Oracle | N/A | Oracle BI Publisher, versions 10.1.3.4.1, 10.1.3.4.2 ; |
Title | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle AutoVue version 20.0.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise FCSM, versions 9.0, 9.1 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle FLEXCUBE Direct Banking, versions 5.0.2, 5.3.0-5.3.4, 6.0.1, 6.2.0 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Sun Product Suite ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise SCM, versions 9.0, 9.1 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Identity Manager 11g, versions 11.1.1.3, 11.1.1.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Application Server 10g Release 3, version 10.1.3.5.0 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Outside In Technology, versions 8.3.5, 8.3.7 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4, 10.2.0.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite Release 11i, version 11.5.10.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle WebCenter Forms Recognition, version 10.1.3.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle JDeveloper, version 10.1.3.5.0 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise Portal version 9.1 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Siebel Life Sciences, versions 8.0.0, 8.1.1, 8.2.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise CRM, version 9.1 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite Release 12, versions 12.0.4, 12.0.6, 12.1.1, 12.1.2, 12.1.3 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 11g Release 2, versions 11.2.0.2, 11.2.0.3 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Enterprise Manager Grid Control 11g Release 1, version 11.1.0.1 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Primavera P6 Enterprise Project Portfolio Management, versions 6.2.1, 8.0, 8.1, 8.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 11g Release 1, version 11.1.0.7 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Enterprise Manager Grid Control 10g Release 1, version 10.2.0.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle JRockit versions, R28.2.2 et ant\u00e9rieures, R27.7.1 et ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle MySQL Server, versions 5.1, 5.5.", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise HCM, version 9.1 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise PeopleTools, versions 8.50, 8.51, 8.52 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Agile, version 6.0.0 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle FLEXCUBE Universal Banking, versions 10.0.0-10.5.0, 11.0.0-11.4.0 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle DB UM Connector for Oracle Identity Manager, Version 9.1.0.4 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise HRMS, versions 8.9, 9.0, 9.1 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle BI Publisher, versions 10.1.3.4.1, 10.1.3.4.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-1710", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1710" }, { "name": "CVE-2012-1695", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1695" }, { "name": "CVE-2012-0557", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0557" }, { "name": "CVE-2012-0533", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0533" }, { "name": "CVE-2012-0552", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0552" }, { "name": "CVE-2012-0541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0541" }, { "name": "CVE-2012-0523", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0523" }, { "name": "CVE-2012-0512", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0512" }, { "name": "CVE-2012-0579", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0579" }, { "name": "CVE-2012-1706", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1706" }, { "name": "CVE-2012-0559", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0559" }, { "name": "CVE-2012-1683", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1683" }, { "name": "CVE-2012-0560", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0560" }, { "name": "CVE-2012-0514", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0514" }, { "name": "CVE-2012-0511", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0511" }, { "name": "CVE-2012-1690", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1690" }, { "name": "CVE-2012-0581", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0581" }, { "name": "CVE-2012-1707", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1707" }, { "name": "CVE-2012-0515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0515" }, { "name": "CVE-2012-0571", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0571" }, { "name": "CVE-2012-1679", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1679" }, { "name": "CVE-2012-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0549" }, { "name": "CVE-2012-1709", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1709" }, { "name": "CVE-2012-0517", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0517" }, { "name": "CVE-2012-1704", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1704" }, { "name": "CVE-2012-0539", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0539" }, { "name": "CVE-2012-0542", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0542" }, { "name": "CVE-2012-0580", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0580" }, { "name": "CVE-2012-1676", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1676" }, { "name": "CVE-2012-0524", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0524" }, { "name": "CVE-2012-0534", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0534" }, { "name": "CVE-2012-1681", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1681" }, { "name": "CVE-2012-0567", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0567" }, { "name": "CVE-2012-0537", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0537" }, { "name": "CVE-2012-0513", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0513" }, { "name": "CVE-2012-0550", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0550" }, { "name": "CVE-2012-0530", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0530" }, { "name": "CVE-2012-0544", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0544" }, { "name": "CVE-2012-0566", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0566" }, { "name": "CVE-2012-1703", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1703" }, { "name": "CVE-2012-0525", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0525" }, { "name": "CVE-2012-0545", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0545" }, { "name": "CVE-2012-0521", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0521" }, { "name": "CVE-2012-0556", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0556" }, { "name": "CVE-2012-0546", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0546" }, { "name": "CVE-2012-0561", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0561" }, { "name": "CVE-2012-0526", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0526" }, { "name": "CVE-2012-1696", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1696" }, { "name": "CVE-2012-0520", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0520" }, { "name": "CVE-2012-0531", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0531" }, { "name": "CVE-2012-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0543" }, { "name": "CVE-2012-0528", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0528" }, { "name": "CVE-2012-0510", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0510" }, { "name": "CVE-2012-0509", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0509" }, { "name": "CVE-2012-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0548" }, { "name": "CVE-2012-0583", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0583" }, { "name": "CVE-2012-1688", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1688" }, { "name": "CVE-2012-1684", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1684" }, { "name": "CVE-2012-1698", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1698" }, { "name": "CVE-2012-0536", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0536" }, { "name": "CVE-2012-0582", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0582" }, { "name": "CVE-2012-0577", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0577" }, { "name": "CVE-2012-1691", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1691" }, { "name": "CVE-2012-0562", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0562" }, { "name": "CVE-2012-1693", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1693" }, { "name": "CVE-2012-0532", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0532" }, { "name": "CVE-2012-0564", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0564" }, { "name": "CVE-2012-0529", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0529" }, { "name": "CVE-2012-1708", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1708" }, { "name": "CVE-2012-0558", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0558" }, { "name": "CVE-2012-0575", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0575" }, { "name": "CVE-2012-0527", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0527" }, { "name": "CVE-2012-1692", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1692" }, { "name": "CVE-2012-0516", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0516" }, { "name": "CVE-2012-0573", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0573" }, { "name": "CVE-2012-1674", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1674" }, { "name": "CVE-2012-0208", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0208" }, { "name": "CVE-2012-1694", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1694" }, { "name": "CVE-2012-0551", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0551" }, { "name": "CVE-2012-1697", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1697" }, { "name": "CVE-2012-0554", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0554" }, { "name": "CVE-2012-0519", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0519" }, { "name": "CVE-2012-0538", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0538" }, { "name": "CVE-2012-0522", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0522" }, { "name": "CVE-2012-0535", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0535" }, { "name": "CVE-2012-0576", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0576" }, { "name": "CVE-2012-0555", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0555" }, { "name": "CVE-2012-0565", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0565" } ], "initial_release_date": "2012-04-18T00:00:00", "last_revision_date": "2012-04-18T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Oracle --cpuapr2012-366314 du 17 avril 2012 :", "url": "http://www.oracle.com/technetwork/topics/cpuapr2012-366314.html" } ], "reference": "CERTA-2012-AVI-220", "revisions": [ { "description": "version initiale.", "revision_date": "2012-04-18T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Quatre-vingt huit vuln\u00e9rabilit\u00e9s critiques ont \u00e9t\u00e9 corrig\u00e9es par \u003cspan\nclass=\"textit\"\u003eOracle\u003c/span\u003e. L\u0027exploitation des vuln\u00e9rabilit\u00e9s peut\nmener \u00e0 une \u00ab ex\u00e9cution de code arbitraire \u00e0 distance \u00bb. Une seule\nvuln\u00e9rabilit\u00e9 est accessible en local, les autres peuvent \u00eatre\nexploit\u00e9es depuis le r\u00e9seau. Le CERTA recommande de mettre \u00e0 jour vos\nproduits \u003cspan class=\"textit\"\u003eOracle\u003c/span\u003e d\u00e8s que possible.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2012-366314 du 17 avril 2012", "url": null } ] }
CERTA-2012-AVI-024
Vulnerability from certfr_avis
Plusieurs vulnérabilités présentes dans de nombreux produits Oracle ont été corrigées.
Description
Plusieurs vulnérabilités dans les produits Oracle peuvent être exploitées, à distance ou depuis le réseau local, afin de porter atteinte à la confidentialité ou à l'intégrité des données présentes sur le système, de réaliser un déni de service ou d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise CRM version 8.9 ; | ||
Oracle | N/A | Oracle Sun Product Suite ; | ||
Oracle | N/A | Oracle Transportation Management versions 5.5, 6.0, 6.1, 6.2 ; | ||
Oracle | Weblogic | Oracle WebLogic Server versions 9.2.4, 10.0.2, 11gR1 (10.3.3, 10.3.4, 10.3.5) ; | ||
Oracle | N/A | Oracle Database 10g Release 2 versions 10.2.0.3, 10.2.0.4, 10.2.0.5 ; | ||
Oracle | MySQL | Oracle MySQL Server, versions 5.0, 5.1, 5.5. | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise HCM versions 8.9, 9.0, 9.1 ; | ||
Oracle | N/A | Oracle Database 10g Release 1 version 10.1.0.5 ; | ||
Oracle | N/A | Oracle Database 11g Release 2 versions 11.2.0.2, 11.2.0.3 ; | ||
Oracle | N/A | Oracle VM VirtualBox version 4.1 ; | ||
Oracle | N/A | Oracle Application Server 10g Release 3 version 10.1.3.5.0 ; | ||
Oracle | N/A | Oracle E-Business Suite Release 11i version 11.5.10.2 ; | ||
Oracle | N/A | Oracle JDEdwards version 8.98 ; | ||
Oracle | N/A | Oracle Fusion Middleware 11g Release 1 versions 11.1.1.3.0, 11.1.1.4.0, 11.1.1.5.0 ; | ||
Oracle | N/A | Oracle Outside In Technology versions 8.3.5, 8.3.7 ; | ||
Oracle | PeopleSoft | Oracle PeopleSoft Enterprise PeopleTools version 8.52 ; | ||
Oracle | N/A | Oracle Database 11g Release 1 version 11.1.0.7 ; | ||
Oracle | N/A | Oracle Virtual Desktop Infrastructure version 3.2 ; | ||
Oracle | N/A | Oracle E-Business Suite Release 12 versions 12.1.2, 12.1.3 ; |
Title | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle PeopleSoft Enterprise CRM version 8.9 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Sun Product Suite ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Transportation Management versions 5.5, 6.0, 6.1, 6.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle WebLogic Server versions 9.2.4, 10.0.2, 11gR1 (10.3.3, 10.3.4, 10.3.5) ;", "product": { "name": "Weblogic", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 10g Release 2 versions 10.2.0.3, 10.2.0.4, 10.2.0.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle MySQL Server, versions 5.0, 5.1, 5.5.", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise HCM versions 8.9, 9.0, 9.1 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 10g Release 1 version 10.1.0.5 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 11g Release 2 versions 11.2.0.2, 11.2.0.3 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle VM VirtualBox version 4.1 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Application Server 10g Release 3 version 10.1.3.5.0 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite Release 11i version 11.5.10.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle JDEdwards version 8.98 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Fusion Middleware 11g Release 1 versions 11.1.1.3.0, 11.1.1.4.0, 11.1.1.5.0 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Outside In Technology versions 8.3.5, 8.3.7 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft Enterprise PeopleTools version 8.52 ;", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database 11g Release 1 version 11.1.0.7 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Virtual Desktop Infrastructure version 3.2 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle E-Business Suite Release 12 versions 12.1.2, 12.1.3 ;", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans les produits Oracle peuvent \u00eatre\nexploit\u00e9es, \u00e0 distance ou depuis le r\u00e9seau local, afin de porter\natteinte \u00e0 la confidentialit\u00e9 ou \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es pr\u00e9sentes sur\nle syst\u00e8me, de r\u00e9aliser un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-0487", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0487" }, { "name": "CVE-2012-0088", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0088" }, { "name": "CVE-2011-2321", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2321" }, { "name": "CVE-2011-3192", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3192" }, { "name": "CVE-2011-3509", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3509" }, { "name": "CVE-2012-0109", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0109" }, { "name": "CVE-2012-0110", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0110" }, { "name": "CVE-2012-0115", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0115" }, { "name": "CVE-2012-0074", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0074" }, { "name": "CVE-2012-0078", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0078" }, { "name": "CVE-2012-0485", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0485" }, { "name": "CVE-2012-0118", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0118" }, { "name": "CVE-2011-2326", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2326" }, { "name": "CVE-2012-0491", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0491" }, { "name": "CVE-2012-0099", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0099" }, { "name": "CVE-2012-0098", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0098" }, { "name": "CVE-2012-0119", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0119" }, { "name": "CVE-2011-2271", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2271" }, { "name": "CVE-2012-0492", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0492" }, { "name": "CVE-2012-0096", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0096" }, { "name": "CVE-2012-0494", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0494" }, { "name": "CVE-2012-0117", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0117" }, { "name": "CVE-2012-0105", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0105" }, { "name": "CVE-2011-3568", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3568" }, { "name": "CVE-2012-0488", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0488" }, { "name": "CVE-2011-3570", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3570" }, { "name": "CVE-2012-0116", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0116" }, { "name": "CVE-2012-0101", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0101" }, { "name": "CVE-2012-0489", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0489" }, { "name": "CVE-2012-0085", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0085" }, { "name": "CVE-2012-0094", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0094" }, { "name": "CVE-2012-0087", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0087" }, { "name": "CVE-2012-0114", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0114" }, { "name": "CVE-2012-0081", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0081" }, { "name": "CVE-2012-0072", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0072" }, { "name": "CVE-2012-0103", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0103" }, { "name": "CVE-2011-3565", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3565" }, { "name": "CVE-2011-4517", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4517" }, { "name": "CVE-2012-0075", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0075" }, { "name": "CVE-2011-3566", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3566" }, { "name": "CVE-2011-3569", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3569" }, { "name": "CVE-2012-0097", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0097" }, { "name": "CVE-2012-0084", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0084" }, { "name": "CVE-2011-3574", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3574" }, { "name": "CVE-2011-3531", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3531" }, { "name": "CVE-2011-3514", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3514" }, { "name": "CVE-2011-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3564" }, { "name": "CVE-2011-4516", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4516" }, { "name": "CVE-2012-0079", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0079" }, { "name": "CVE-2011-3524", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3524" }, { "name": "CVE-2012-0076", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0076" }, { "name": "CVE-2012-0080", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0080" }, { "name": "CVE-2011-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3573" }, { "name": "CVE-2011-2325", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2325" }, { "name": "CVE-2011-2324", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2324" }, { "name": "CVE-2012-0486", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0486" }, { "name": "CVE-2012-0082", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0082" }, { "name": "CVE-2012-0091", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0091" }, { "name": "CVE-2012-0104", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0104" }, { "name": "CVE-2012-0089", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0089" }, { "name": "CVE-2012-0484", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0484" }, { "name": "CVE-2012-0113", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0113" }, { "name": "CVE-2012-0077", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0077" }, { "name": "CVE-2011-2317", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2317" }, { "name": "CVE-2012-0073", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0073" }, { "name": "CVE-2011-3571", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3571" }, { "name": "CVE-2012-0102", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0102" }, { "name": "CVE-2012-0100", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0100" }, { "name": "CVE-2012-0493", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0493" }, { "name": "CVE-2012-0120", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0120" }, { "name": "CVE-2012-0495", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0495" }, { "name": "CVE-2012-0490", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0490" }, { "name": "CVE-2012-0496", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0496" }, { "name": "CVE-2012-0112", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0112" }, { "name": "CVE-2011-5035", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035" }, { "name": "CVE-2012-0111", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0111" }, { "name": "CVE-2012-0083", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0083" }, { "name": "CVE-2011-2262", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2262" } ], "initial_release_date": "2012-01-18T00:00:00", "last_revision_date": "2012-01-18T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Oracle Critical Patch Update du 17 janvier 2012 :", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" } ], "reference": "CERTA-2012-AVI-024", "revisions": [ { "description": "version initiale.", "revision_date": "2012-01-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans de nombreux produits Oracle ont\n\u00e9t\u00e9 corrig\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle Critical Patch Update du 17 janvier 2012", "url": null } ] }