Refine your search

7 vulnerabilities found for Systems by Oracle

CERTFR-2025-AVI-0322
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Oracle Systems. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Oracle Systems Oracle Solaris version 11
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle Solaris version 11",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-30700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30700"
    },
    {
      "name": "CVE-2025-30690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30690"
    }
  ],
  "initial_release_date": "2025-04-16T00:00:00",
  "last_revision_date": "2025-04-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0322",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
  "vendor_advisories": [
    {
      "published_at": "2025-04-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle Systems cpuapr2025",
      "url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
    }
  ]
}

CERTFR-2025-AVI-0056
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Oracle Systems. Elle permet à un attaquant de provoquer une atteinte à l'intégrité des données et un déni de service.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Oracle Systems Oracle Solaris version 11
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle Solaris version 11",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-21551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21551"
    }
  ],
  "initial_release_date": "2025-01-22T00:00:00",
  "last_revision_date": "2025-01-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0056",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-01-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Oracle Systems. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Oracle Systems",
  "vendor_advisories": [
    {
      "published_at": "2025-01-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle Systems cpujan2025",
      "url": "https://www.oracle.com/security-alerts/cpujan2025.html"
    }
  ]
}

CERTFR-2024-AVI-0886
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Oracle Systems. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Oracle Systems Oracle Solaris Cluster version 4
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle Solaris Cluster version 4",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-33201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
    },
    {
      "name": "CVE-2022-46337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46337"
    },
    {
      "name": "CVE-2023-5072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
    },
    {
      "name": "CVE-2024-22262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22262"
    },
    {
      "name": "CVE-2024-23635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23635"
    },
    {
      "name": "CVE-2023-44483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    }
  ],
  "initial_release_date": "2024-10-16T00:00:00",
  "last_revision_date": "2024-10-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0886",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
  "vendor_advisories": [
    {
      "published_at": "2024-10-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle Systems cpuoct2024",
      "url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
    }
  ]
}

CERTFR-2024-AVI-0597
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Oracle Systems. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un déni de service.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Oracle Systems Solaris version 11 sans les derniers correctifs de sécurité
Oracle Systems ZFS Storage Appliance Kit version 8.8 sans les derniers correctifs de sécurité
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Solaris version 11 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "ZFS Storage Appliance Kit version 8.8 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-21155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21155"
    },
    {
      "name": "CVE-2024-21151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21151"
    }
  ],
  "initial_release_date": "2024-07-17T00:00:00",
  "last_revision_date": "2024-07-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0597",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
  "vendor_advisories": [
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024verbose",
      "url": "https://www.oracle.com/security-alerts/cpujul2024verbose.html#SUNS"
    },
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024",
      "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixSUNS"
    }
  ]
}

CERTFR-2023-AVI-0325
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Oracle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Oracle Java SE Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20
Oracle Database Server Oracle Database Server 19c, 21c
Oracle N/A Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1
Oracle PeopleSoft Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2
Oracle Virtualization Oracle Virtualization versions 6.1.x antérieures à 6.1.44
Oracle MySQL Oracle MySQL versions 8.0.33 et antérieures
Oracle Systems Oracle Systems versions 10, 11
Oracle Virtualization Oracle Virtualization versions 7.0.x antérieures à 7.0.8
Oracle MySQL Oracle MySQL versions 5.7.41 et antérieures
Oracle Weblogic Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20",
      "product": {
        "name": "Java SE",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Database Server 19c, 21c",
      "product": {
        "name": "Database Server",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Virtualization versions 6.1.x ant\u00e9rieures \u00e0 6.1.44",
      "product": {
        "name": "Virtualization",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle MySQL versions 8.0.33 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Systems versions 10, 11",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Virtualization versions 7.0.x ant\u00e9rieures \u00e0 7.0.8",
      "product": {
        "name": "Virtualization",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle MySQL versions 5.7.41 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0",
      "product": {
        "name": "Weblogic",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-21938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
    },
    {
      "name": "CVE-2023-21916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21916"
    },
    {
      "name": "CVE-2023-21985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21985"
    },
    {
      "name": "CVE-2023-21979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21979"
    },
    {
      "name": "CVE-2023-21986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21986"
    },
    {
      "name": "CVE-2020-14343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
    },
    {
      "name": "CVE-2023-21954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
    },
    {
      "name": "CVE-2023-21940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21940"
    },
    {
      "name": "CVE-2023-21939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
    },
    {
      "name": "CVE-2023-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21962"
    },
    {
      "name": "CVE-2022-31160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
    },
    {
      "name": "CVE-2022-45061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
    },
    {
      "name": "CVE-2023-21917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21917"
    },
    {
      "name": "CVE-2023-21984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21984"
    },
    {
      "name": "CVE-2023-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21956"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-21945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21945"
    },
    {
      "name": "CVE-2022-42916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
    },
    {
      "name": "CVE-2023-21966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21966"
    },
    {
      "name": "CVE-2023-21947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21947"
    },
    {
      "name": "CVE-2023-22002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22002"
    },
    {
      "name": "CVE-2023-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21981"
    },
    {
      "name": "CVE-2023-21987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21987"
    },
    {
      "name": "CVE-2023-21977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
    },
    {
      "name": "CVE-2023-21971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21971"
    },
    {
      "name": "CVE-2023-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21999"
    },
    {
      "name": "CVE-2023-21928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21928"
    },
    {
      "name": "CVE-2023-21972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21972"
    },
    {
      "name": "CVE-2023-21960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21960"
    },
    {
      "name": "CVE-2021-37533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
    },
    {
      "name": "CVE-2023-21990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21990"
    },
    {
      "name": "CVE-2023-22000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22000"
    },
    {
      "name": "CVE-2023-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21913"
    },
    {
      "name": "CVE-2023-23918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
    },
    {
      "name": "CVE-2021-36090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
    },
    {
      "name": "CVE-2023-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
    },
    {
      "name": "CVE-2023-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21980"
    },
    {
      "name": "CVE-2020-6950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6950"
    },
    {
      "name": "CVE-2023-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21996"
    },
    {
      "name": "CVE-2022-40152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
    },
    {
      "name": "CVE-2023-21953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21953"
    },
    {
      "name": "CVE-2023-21934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21934"
    },
    {
      "name": "CVE-2023-22003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22003"
    },
    {
      "name": "CVE-2023-21998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21998"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2023-21946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21946"
    },
    {
      "name": "CVE-2023-21933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21933"
    },
    {
      "name": "CVE-2023-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21931"
    },
    {
      "name": "CVE-2023-21937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
    },
    {
      "name": "CVE-2022-45143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45143"
    },
    {
      "name": "CVE-2023-21896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21896"
    },
    {
      "name": "CVE-2022-43551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
    },
    {
      "name": "CVE-2023-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21964"
    },
    {
      "name": "CVE-2021-22569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
    },
    {
      "name": "CVE-2022-34169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
    },
    {
      "name": "CVE-2022-43548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
    },
    {
      "name": "CVE-2023-21920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21920"
    },
    {
      "name": "CVE-2022-45685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
    },
    {
      "name": "CVE-2023-21918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21918"
    },
    {
      "name": "CVE-2023-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21992"
    },
    {
      "name": "CVE-2023-21911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21911"
    },
    {
      "name": "CVE-2023-21976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21976"
    },
    {
      "name": "CVE-2021-31684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
    },
    {
      "name": "CVE-2023-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
    },
    {
      "name": "CVE-2023-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21991"
    },
    {
      "name": "CVE-2023-21989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21989"
    },
    {
      "name": "CVE-2023-21982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21982"
    },
    {
      "name": "CVE-2023-21930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
    },
    {
      "name": "CVE-2023-24998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
    },
    {
      "name": "CVE-2023-21935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21935"
    },
    {
      "name": "CVE-2020-25638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25638"
    },
    {
      "name": "CVE-2023-21955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21955"
    },
    {
      "name": "CVE-2023-21988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21988"
    },
    {
      "name": "CVE-2022-1471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
    },
    {
      "name": "CVE-2022-45047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45047"
    },
    {
      "name": "CVE-2022-36033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033"
    },
    {
      "name": "CVE-2023-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
    },
    {
      "name": "CVE-2023-21929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21929"
    },
    {
      "name": "CVE-2023-21967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
    },
    {
      "name": "CVE-2023-22001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22001"
    },
    {
      "name": "CVE-2022-41881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
    },
    {
      "name": "CVE-2023-21948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21948"
    },
    {
      "name": "CVE-2023-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21919"
    }
  ],
  "initial_release_date": "2023-04-19T00:00:00",
  "last_revision_date": "2023-04-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0325",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-04-19T00:00:00.000000"
    },
    {
      "description": "Correction coquilles.",
      "revision_date": "2023-04-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2023 du 18 avril 2023",
      "url": "https://www.oracle.com/security-alerts/cpuapr2023.html"
    }
  ]
}

CERTFR-2021-AVI-560
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Oracle Systems. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Oracle Systems Oracle Systems version 2.3
Oracle Systems Oracle Systems version 11
Oracle Systems Oracle Systems versions antérieures à XCP2400, XCP3100
Oracle Systems Oracle Systems version 8.8
Oracle Systems Oracle Systems version 4.4
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle Systems version 2.3",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Systems version 11",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Systems versions ant\u00e9rieures \u00e0 XCP2400, XCP3100",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Systems version 8.8",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Systems version 4.4",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2018-7183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7183"
    },
    {
      "name": "CVE-2018-0739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
    },
    {
      "name": "CVE-2020-10683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10683"
    },
    {
      "name": "CVE-2020-5421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-5421"
    },
    {
      "name": "CVE-2021-2381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2381"
    },
    {
      "name": "CVE-2019-3740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3740"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2017-16931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
    },
    {
      "name": "CVE-2019-10086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086"
    },
    {
      "name": "CVE-2017-5461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
    },
    {
      "name": "CVE-2016-4429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4429"
    }
  ],
  "initial_release_date": "2021-07-21T00:00:00",
  "last_revision_date": "2021-07-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-560",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-07-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2021 du 21 juillet 2021",
      "url": "https://www.oracle.com/security-alerts/cpujul2021.html"
    }
  ]
}

CERTFR-2020-AVI-665
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Oracle Systems. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Oracle N/A Oracle ZFS Storage Appliance kit version 8.8 sans le dernier correctif de sécurité
Oracle Systems Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware antérieur à XCP2362
Oracle Systems Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware antérieur à XCP3090
Oracle N/A Oracle Solaris versions 10 et 11 sans le dernier correctif de sécurité
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle ZFS Storage Appliance kit version 8.8 sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware ant\u00e9rieur \u00e0 XCP2362",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware ant\u00e9rieur \u00e0 XCP3090",
      "product": {
        "name": "Systems",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Solaris versions 10 et 11 sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-14759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14759"
    },
    {
      "name": "CVE-2020-3909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3909"
    },
    {
      "name": "CVE-2019-11477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
    },
    {
      "name": "CVE-2020-14758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14758"
    },
    {
      "name": "CVE-2020-14754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14754"
    },
    {
      "name": "CVE-2020-14871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
    },
    {
      "name": "CVE-2020-14818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14818"
    },
    {
      "name": "CVE-2018-3693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
    }
  ],
  "initial_release_date": "2020-10-21T00:00:00",
  "last_revision_date": "2020-10-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-665",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-10-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2020 du 20 octobre 2020",
      "url": "https://www.oracle.com/security-alerts/cpuoct2020verbose.html"
    }
  ]
}