Refine your search
7 vulnerabilities found for Systems by Oracle
CERTFR-2025-AVI-0322
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle Solaris version 11", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-30700", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30700" }, { "name": "CVE-2025-30690", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30690" } ], "initial_release_date": "2025-04-16T00:00:00", "last_revision_date": "2025-04-16T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0322", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-16T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems", "vendor_advisories": [ { "published_at": "2025-04-15", "title": "Bulletin de s\u00e9curit\u00e9 Oracle Systems cpuapr2025", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ] }
CERTFR-2025-AVI-0056
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Oracle Systems. Elle permet à un attaquant de provoquer une atteinte à l'intégrité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle Solaris version 11", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-21551", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21551" } ], "initial_release_date": "2025-01-22T00:00:00", "last_revision_date": "2025-01-22T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0056", "revisions": [ { "description": "Version initiale", "revision_date": "2025-01-22T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "D\u00e9ni de service" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Oracle Systems. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un d\u00e9ni de service.", "title": "Vuln\u00e9rabilit\u00e9 dans Oracle Systems", "vendor_advisories": [ { "published_at": "2025-01-21", "title": "Bulletin de s\u00e9curit\u00e9 Oracle Systems cpujan2025", "url": "https://www.oracle.com/security-alerts/cpujan2025.html" } ] }
CERTFR-2024-AVI-0886
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle Solaris Cluster version 4", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-33201", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33201" }, { "name": "CVE-2022-46337", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46337" }, { "name": "CVE-2023-5072", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5072" }, { "name": "CVE-2024-22262", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22262" }, { "name": "CVE-2024-23635", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23635" }, { "name": "CVE-2023-44483", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483" }, { "name": "CVE-2023-2976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976" } ], "initial_release_date": "2024-10-16T00:00:00", "last_revision_date": "2024-10-16T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0886", "revisions": [ { "description": "Version initiale", "revision_date": "2024-10-16T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems", "vendor_advisories": [ { "published_at": "2024-10-15", "title": "Bulletin de s\u00e9curit\u00e9 Oracle Systems cpuoct2024", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ] }
CERTFR-2024-AVI-0597
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Solaris version 11 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "ZFS Storage Appliance Kit version 8.8 sans les derniers correctifs de s\u00e9curit\u00e9", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-21155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21155" }, { "name": "CVE-2024-21151", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21151" } ], "initial_release_date": "2024-07-17T00:00:00", "last_revision_date": "2024-07-17T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0597", "revisions": [ { "description": "Version initiale", "revision_date": "2024-07-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems", "vendor_advisories": [ { "published_at": "2024-07-16", "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024verbose", "url": "https://www.oracle.com/security-alerts/cpujul2024verbose.html#SUNS" }, { "published_at": "2024-07-16", "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixSUNS" } ] }
CERTFR-2023-AVI-0325
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Oracle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | Java SE | Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20 | ||
Oracle | Database Server | Oracle Database Server 19c, 21c | ||
Oracle | N/A | Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1 | ||
Oracle | PeopleSoft | Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2 | ||
Oracle | Virtualization | Oracle Virtualization versions 6.1.x antérieures à 6.1.44 | ||
Oracle | MySQL | Oracle MySQL versions 8.0.33 et antérieures | ||
Oracle | Systems | Oracle Systems versions 10, 11 | ||
Oracle | Virtualization | Oracle Virtualization versions 7.0.x antérieures à 7.0.8 | ||
Oracle | MySQL | Oracle MySQL versions 5.7.41 et antérieures | ||
Oracle | Weblogic | Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Database Server 19c, 21c", "product": { "name": "Database Server", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2", "product": { "name": "PeopleSoft", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Virtualization versions 6.1.x ant\u00e9rieures \u00e0 6.1.44", "product": { "name": "Virtualization", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle MySQL versions 8.0.33 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Systems versions 10, 11", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Virtualization versions 7.0.x ant\u00e9rieures \u00e0 7.0.8", "product": { "name": "Virtualization", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle MySQL versions 5.7.41 et ant\u00e9rieures", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0", "product": { "name": "Weblogic", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-21938", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21938" }, { "name": "CVE-2023-21916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21916" }, { "name": "CVE-2023-21985", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21985" }, { "name": "CVE-2023-21979", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21979" }, { "name": "CVE-2023-21986", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21986" }, { "name": "CVE-2020-14343", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14343" }, { "name": "CVE-2023-21954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21954" }, { "name": "CVE-2023-21940", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21940" }, { "name": "CVE-2023-21939", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21939" }, { "name": "CVE-2023-21962", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21962" }, { "name": "CVE-2022-31160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31160" }, { "name": "CVE-2022-45061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061" }, { "name": "CVE-2023-21917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21917" }, { "name": "CVE-2023-21984", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21984" }, { "name": "CVE-2023-21956", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21956" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-21945", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21945" }, { "name": "CVE-2022-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916" }, { "name": "CVE-2023-21966", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21966" }, { "name": "CVE-2023-21947", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21947" }, { "name": "CVE-2023-22002", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22002" }, { "name": "CVE-2023-21981", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21981" }, { "name": "CVE-2023-21987", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21987" }, { "name": "CVE-2023-21977", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977" }, { "name": "CVE-2023-21971", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21971" }, { "name": "CVE-2023-21999", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21999" }, { "name": "CVE-2023-21928", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21928" }, { "name": "CVE-2023-21972", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21972" }, { "name": "CVE-2023-21960", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21960" }, { "name": "CVE-2021-37533", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37533" }, { "name": "CVE-2023-21990", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21990" }, { "name": "CVE-2023-22000", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22000" }, { "name": "CVE-2023-21913", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21913" }, { "name": "CVE-2023-23918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23918" }, { "name": "CVE-2021-36090", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36090" }, { "name": "CVE-2023-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963" }, { "name": "CVE-2023-21980", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21980" }, { "name": "CVE-2020-6950", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6950" }, { "name": "CVE-2023-21996", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21996" }, { "name": "CVE-2022-40152", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40152" }, { "name": "CVE-2023-21953", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21953" }, { "name": "CVE-2023-21934", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21934" }, { "name": "CVE-2023-22003", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22003" }, { "name": "CVE-2023-21998", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21998" }, { "name": "CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "name": "CVE-2023-21946", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21946" }, { "name": "CVE-2023-21933", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21933" }, { "name": "CVE-2023-21931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21931" }, { "name": "CVE-2023-21937", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21937" }, { "name": "CVE-2022-45143", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45143" }, { "name": "CVE-2023-21896", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21896" }, { "name": "CVE-2022-43551", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551" }, { "name": "CVE-2023-21964", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21964" }, { "name": "CVE-2021-22569", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22569" }, { "name": "CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "name": "CVE-2022-43548", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43548" }, { "name": "CVE-2023-21920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21920" }, { "name": "CVE-2022-45685", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45685" }, { "name": "CVE-2023-21918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21918" }, { "name": "CVE-2023-21992", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21992" }, { "name": "CVE-2023-21911", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21911" }, { "name": "CVE-2023-21976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21976" }, { "name": "CVE-2021-31684", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31684" }, { "name": "CVE-2023-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21968" }, { "name": "CVE-2023-21991", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21991" }, { "name": "CVE-2023-21989", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21989" }, { "name": "CVE-2023-21982", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21982" }, { "name": "CVE-2023-21930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21930" }, { "name": "CVE-2023-24998", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24998" }, { "name": "CVE-2023-21935", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21935" }, { "name": "CVE-2020-25638", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25638" }, { "name": "CVE-2023-21955", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21955" }, { "name": "CVE-2023-21988", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21988" }, { "name": "CVE-2022-1471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471" }, { "name": "CVE-2022-45047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047" }, { "name": "CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "name": "CVE-2023-21912", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912" }, { "name": "CVE-2023-21929", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21929" }, { "name": "CVE-2023-21967", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21967" }, { "name": "CVE-2023-22001", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22001" }, { "name": "CVE-2022-41881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41881" }, { "name": "CVE-2023-21948", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21948" }, { "name": "CVE-2023-21919", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21919" } ], "initial_release_date": "2023-04-19T00:00:00", "last_revision_date": "2023-04-20T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0325", "revisions": [ { "description": "Version initiale", "revision_date": "2023-04-19T00:00:00.000000" }, { "description": "Correction coquilles.", "revision_date": "2023-04-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2023 du 18 avril 2023", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html" } ] }
CERTFR-2021-AVI-560
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle Systems version 2.3", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Systems version 11", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Systems versions ant\u00e9rieures \u00e0 XCP2400, XCP3100", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Systems version 8.8", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Systems version 4.4", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-7183", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7183" }, { "name": "CVE-2018-0739", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0739" }, { "name": "CVE-2020-10683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10683" }, { "name": "CVE-2020-5421", "url": "https://www.cve.org/CVERecord?id=CVE-2020-5421" }, { "name": "CVE-2021-2381", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2381" }, { "name": "CVE-2019-3740", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3740" }, { "name": "CVE-2021-3177", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177" }, { "name": "CVE-2017-16931", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16931" }, { "name": "CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "name": "CVE-2017-5461", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5461" }, { "name": "CVE-2016-4429", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4429" } ], "initial_release_date": "2021-07-21T00:00:00", "last_revision_date": "2021-07-21T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-560", "revisions": [ { "description": "Version initiale", "revision_date": "2021-07-21T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2021 du 21 juillet 2021", "url": "https://www.oracle.com/security-alerts/cpujul2021.html" } ] }
CERTFR-2020-AVI-665
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Oracle | N/A | Oracle ZFS Storage Appliance kit version 8.8 sans le dernier correctif de sécurité | ||
Oracle | Systems | Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware antérieur à XCP2362 | ||
Oracle | Systems | Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware antérieur à XCP3090 | ||
Oracle | N/A | Oracle Solaris versions 10 et 11 sans le dernier correctif de sécurité |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle ZFS Storage Appliance kit version 8.8 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware ant\u00e9rieur \u00e0 XCP2362", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware ant\u00e9rieur \u00e0 XCP3090", "product": { "name": "Systems", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Solaris versions 10 et 11 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-14759", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14759" }, { "name": "CVE-2020-3909", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3909" }, { "name": "CVE-2019-11477", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11477" }, { "name": "CVE-2020-14758", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14758" }, { "name": "CVE-2020-14754", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14754" }, { "name": "CVE-2020-14871", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14871" }, { "name": "CVE-2020-14818", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14818" }, { "name": "CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" } ], "initial_release_date": "2020-10-21T00:00:00", "last_revision_date": "2020-10-21T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-665", "revisions": [ { "description": "Version initiale", "revision_date": "2020-10-21T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2020 du 20 octobre 2020", "url": "https://www.oracle.com/security-alerts/cpuoct2020verbose.html" } ] }