CERTA-2012-AVI-220
Vulnerability from certfr_avis

Quatre-vingt huit vulnérabilités critiques ont été corrigées par Oracle. L'exploitation des vulnérabilités peut mener à une « exécution de code arbitraire à distance ». Une seule vulnérabilité est accessible en local, les autres peuvent être exploitées depuis le réseau. Le CERTA recommande de mettre à jour vos produits Oracle dès que possible.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Oracle N/A Oracle AutoVue version 20.0.2 ;
Oracle PeopleSoft Oracle PeopleSoft Enterprise FCSM, versions 9.0, 9.1 ;
Oracle N/A Oracle FLEXCUBE Direct Banking, versions 5.0.2, 5.3.0-5.3.4, 6.0.1, 6.2.0 ;
Oracle N/A Oracle Sun Product Suite ;
Oracle PeopleSoft Oracle PeopleSoft Enterprise SCM, versions 9.0, 9.1 ;
Oracle N/A Oracle Identity Manager 11g, versions 11.1.1.3, 11.1.1.5 ;
Oracle N/A Oracle Application Server 10g Release 3, version 10.1.3.5.0 ;
Oracle N/A Oracle Outside In Technology, versions 8.3.5, 8.3.7 ;
Oracle N/A Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4, 10.2.0.5 ;
Oracle N/A Oracle E-Business Suite Release 11i, version 11.5.10.2 ;
Oracle N/A Oracle WebCenter Forms Recognition, version 10.1.3.5 ;
Oracle N/A Oracle JDeveloper, version 10.1.3.5.0 ;
Oracle PeopleSoft Oracle PeopleSoft Enterprise Portal version 9.1 ;
Oracle N/A Oracle Siebel Life Sciences, versions 8.0.0, 8.1.1, 8.2.2 ;
Oracle PeopleSoft Oracle PeopleSoft Enterprise CRM, version 9.1 ;
Oracle N/A Oracle E-Business Suite Release 12, versions 12.0.4, 12.0.6, 12.1.1, 12.1.2, 12.1.3 ;
Oracle N/A Oracle Database 11g Release 2, versions 11.2.0.2, 11.2.0.3 ;
Oracle N/A Enterprise Manager Grid Control 11g Release 1, version 11.1.0.1 ;
Oracle N/A Primavera P6 Enterprise Project Portfolio Management, versions 6.2.1, 8.0, 8.1, 8.2 ;
Oracle N/A Oracle Database 11g Release 1, version 11.1.0.7 ;
Oracle N/A Enterprise Manager Grid Control 10g Release 1, version 10.2.0.5 ;
Oracle N/A Oracle JRockit versions, R28.2.2 et antérieures, R27.7.1 et antérieures ;
Oracle MySQL Oracle MySQL Server, versions 5.1, 5.5.
Oracle PeopleSoft Oracle PeopleSoft Enterprise HCM, version 9.1 ;
Oracle PeopleSoft Oracle PeopleSoft Enterprise PeopleTools, versions 8.50, 8.51, 8.52 ;
Oracle N/A Oracle Agile, version 6.0.0 ;
Oracle N/A Oracle FLEXCUBE Universal Banking, versions 10.0.0-10.5.0, 11.0.0-11.4.0 ;
Oracle N/A Oracle DB UM Connector for Oracle Identity Manager, Version 9.1.0.4 ;
Oracle PeopleSoft Oracle PeopleSoft Enterprise HRMS, versions 8.9, 9.0, 9.1 ;
Oracle N/A Oracle BI Publisher, versions 10.1.3.4.1, 10.1.3.4.2 ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Oracle AutoVue version 20.0.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle PeopleSoft Enterprise FCSM, versions 9.0, 9.1 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle FLEXCUBE Direct Banking, versions 5.0.2, 5.3.0-5.3.4, 6.0.1, 6.2.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Sun Product Suite ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle PeopleSoft Enterprise SCM, versions 9.0, 9.1 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Identity Manager 11g, versions 11.1.1.3, 11.1.1.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Application Server 10g Release 3, version 10.1.3.5.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Outside In Technology, versions 8.3.5, 8.3.7 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4, 10.2.0.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle E-Business Suite Release 11i, version 11.5.10.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle WebCenter Forms Recognition, version 10.1.3.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle JDeveloper, version 10.1.3.5.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle PeopleSoft Enterprise Portal version 9.1 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Siebel Life Sciences, versions 8.0.0, 8.1.1, 8.2.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle PeopleSoft Enterprise CRM, version 9.1 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle E-Business Suite Release 12, versions 12.0.4, 12.0.6, 12.1.1, 12.1.2, 12.1.3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Database 11g Release 2, versions 11.2.0.2, 11.2.0.3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Manager Grid Control 11g Release 1, version 11.1.0.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Primavera P6 Enterprise Project Portfolio Management, versions 6.2.1, 8.0, 8.1, 8.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Database 11g Release 1, version 11.1.0.7 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Manager Grid Control 10g Release 1, version 10.2.0.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle JRockit versions, R28.2.2 et ant\u00e9rieures, R27.7.1 et ant\u00e9rieures ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle MySQL Server, versions 5.1, 5.5.",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle PeopleSoft Enterprise HCM, version 9.1 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle PeopleSoft Enterprise PeopleTools, versions 8.50, 8.51, 8.52 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle Agile, version 6.0.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle FLEXCUBE Universal Banking, versions 10.0.0-10.5.0, 11.0.0-11.4.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle DB UM Connector for Oracle Identity Manager, Version 9.1.0.4 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle PeopleSoft Enterprise HRMS, versions 8.9, 9.0, 9.1 ;",
      "product": {
        "name": "PeopleSoft",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "Oracle BI Publisher, versions 10.1.3.4.1, 10.1.3.4.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-1710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1710"
    },
    {
      "name": "CVE-2012-1695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1695"
    },
    {
      "name": "CVE-2012-0557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0557"
    },
    {
      "name": "CVE-2012-0533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0533"
    },
    {
      "name": "CVE-2012-0552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0552"
    },
    {
      "name": "CVE-2012-0541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0541"
    },
    {
      "name": "CVE-2012-0523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0523"
    },
    {
      "name": "CVE-2012-0512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0512"
    },
    {
      "name": "CVE-2012-0579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0579"
    },
    {
      "name": "CVE-2012-1706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1706"
    },
    {
      "name": "CVE-2012-0559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0559"
    },
    {
      "name": "CVE-2012-1683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1683"
    },
    {
      "name": "CVE-2012-0560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0560"
    },
    {
      "name": "CVE-2012-0514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0514"
    },
    {
      "name": "CVE-2012-0511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0511"
    },
    {
      "name": "CVE-2012-1690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1690"
    },
    {
      "name": "CVE-2012-0581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0581"
    },
    {
      "name": "CVE-2012-1707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1707"
    },
    {
      "name": "CVE-2012-0515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0515"
    },
    {
      "name": "CVE-2012-0571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0571"
    },
    {
      "name": "CVE-2012-1679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1679"
    },
    {
      "name": "CVE-2012-0549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0549"
    },
    {
      "name": "CVE-2012-1709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1709"
    },
    {
      "name": "CVE-2012-0517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0517"
    },
    {
      "name": "CVE-2012-1704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1704"
    },
    {
      "name": "CVE-2012-0539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0539"
    },
    {
      "name": "CVE-2012-0542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0542"
    },
    {
      "name": "CVE-2012-0580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0580"
    },
    {
      "name": "CVE-2012-1676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1676"
    },
    {
      "name": "CVE-2012-0524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0524"
    },
    {
      "name": "CVE-2012-0534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0534"
    },
    {
      "name": "CVE-2012-1681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1681"
    },
    {
      "name": "CVE-2012-0567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0567"
    },
    {
      "name": "CVE-2012-0537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0537"
    },
    {
      "name": "CVE-2012-0513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0513"
    },
    {
      "name": "CVE-2012-0550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0550"
    },
    {
      "name": "CVE-2012-0530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0530"
    },
    {
      "name": "CVE-2012-0544",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0544"
    },
    {
      "name": "CVE-2012-0566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0566"
    },
    {
      "name": "CVE-2012-1703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1703"
    },
    {
      "name": "CVE-2012-0525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0525"
    },
    {
      "name": "CVE-2012-0545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0545"
    },
    {
      "name": "CVE-2012-0521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0521"
    },
    {
      "name": "CVE-2012-0556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0556"
    },
    {
      "name": "CVE-2012-0546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0546"
    },
    {
      "name": "CVE-2012-0561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0561"
    },
    {
      "name": "CVE-2012-0526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0526"
    },
    {
      "name": "CVE-2012-1696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1696"
    },
    {
      "name": "CVE-2012-0520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0520"
    },
    {
      "name": "CVE-2012-0531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0531"
    },
    {
      "name": "CVE-2012-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0543"
    },
    {
      "name": "CVE-2012-0528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0528"
    },
    {
      "name": "CVE-2012-0510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0510"
    },
    {
      "name": "CVE-2012-0509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0509"
    },
    {
      "name": "CVE-2012-0548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0548"
    },
    {
      "name": "CVE-2012-0583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0583"
    },
    {
      "name": "CVE-2012-1688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1688"
    },
    {
      "name": "CVE-2012-1684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1684"
    },
    {
      "name": "CVE-2012-1698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1698"
    },
    {
      "name": "CVE-2012-0536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0536"
    },
    {
      "name": "CVE-2012-0582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0582"
    },
    {
      "name": "CVE-2012-0577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0577"
    },
    {
      "name": "CVE-2012-1691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1691"
    },
    {
      "name": "CVE-2012-0562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0562"
    },
    {
      "name": "CVE-2012-1693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1693"
    },
    {
      "name": "CVE-2012-0532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0532"
    },
    {
      "name": "CVE-2012-0564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0564"
    },
    {
      "name": "CVE-2012-0529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0529"
    },
    {
      "name": "CVE-2012-1708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1708"
    },
    {
      "name": "CVE-2012-0558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0558"
    },
    {
      "name": "CVE-2012-0575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0575"
    },
    {
      "name": "CVE-2012-0527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0527"
    },
    {
      "name": "CVE-2012-1692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1692"
    },
    {
      "name": "CVE-2012-0516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0516"
    },
    {
      "name": "CVE-2012-0573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0573"
    },
    {
      "name": "CVE-2012-1674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1674"
    },
    {
      "name": "CVE-2012-0208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0208"
    },
    {
      "name": "CVE-2012-1694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1694"
    },
    {
      "name": "CVE-2012-0551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0551"
    },
    {
      "name": "CVE-2012-1697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-1697"
    },
    {
      "name": "CVE-2012-0554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0554"
    },
    {
      "name": "CVE-2012-0519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0519"
    },
    {
      "name": "CVE-2012-0538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0538"
    },
    {
      "name": "CVE-2012-0522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0522"
    },
    {
      "name": "CVE-2012-0535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0535"
    },
    {
      "name": "CVE-2012-0576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0576"
    },
    {
      "name": "CVE-2012-0555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0555"
    },
    {
      "name": "CVE-2012-0565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0565"
    }
  ],
  "initial_release_date": "2012-04-18T00:00:00",
  "last_revision_date": "2012-04-18T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle --cpuapr2012-366314 du 17 avril    2012 :",
      "url": "http://www.oracle.com/technetwork/topics/cpuapr2012-366314.html"
    }
  ],
  "reference": "CERTA-2012-AVI-220",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-04-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Quatre-vingt huit vuln\u00e9rabilit\u00e9s critiques ont \u00e9t\u00e9 corrig\u00e9es par \u003cspan\nclass=\"textit\"\u003eOracle\u003c/span\u003e. L\u0027exploitation des vuln\u00e9rabilit\u00e9s peut\nmener \u00e0 une \u00ab ex\u00e9cution de code arbitraire \u00e0 distance \u00bb. Une seule\nvuln\u00e9rabilit\u00e9 est accessible en local, les autres peuvent \u00eatre\nexploit\u00e9es depuis le r\u00e9seau. Le CERTA recommande de mettre \u00e0 jour vos\nproduits \u003cspan class=\"textit\"\u003eOracle\u003c/span\u003e d\u00e8s que possible.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2012-366314 du 17 avril 2012",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…