VAR-201004-0739
Vulnerability from variot - Updated: 2022-05-17 02:01Oracle has released advance notification regarding the April 2010 critical patch update to be released on April 13, 2010. The update addresses 47 vulnerabilities affecting the following software: Oracle Database Oracle Fusion Middleware Oracle Collaboration Suite Oracle E-Business Suite Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Oracle Industry Suite Oracle Solaris Products The following individual records exist to better document these issues: 39453 Oracle Sun Java System Directory Server CVE-2010-0897 Multiple Remote Vulnerabilities 39459 Oracle Solaris CVE-2010-0890 Local Vulnerability 39462 Oracle Sun Management Center CVE-2010-0891 Remote Vulnerability 39456 Oracle OpenSolaris CVE-2010-0889 Local Information Disclosure Vulnerability 39461 Oracle Sun Java System Communications Express CVE-2010-0885 Remote Address Book Vulnerability 39464 Oracle Cluster CVE-2010-0884 Unspecified Local Vulnerability 39460 Oracle Cluster CVE-2010-0883 Unspecified Local Vulnerability 39457 Oracle Java System Access Manager CVE-2010-0894 Remote Vulnerability 39458 Oracle Sun Convergence CVE-2010-0896 Remote Address Book/Mail Filter Vulnerability 39448 Oracle Industry Products Suite CVE-2010-0864 Remote Retail Place In-Season Vulnerability 39455 Oracle Solaris CVE-2010-0895 Unspecified Local Vulnerability 39454 Oracle Industry Product Suite CVE-2010-0863 Oracle Retail Plan In-Season Vulnerability 39451 Oracle Industry Applications CVE-2010-0875 Remote Thesaurus Management System Vulnerability 39452 Oracle E-Business Suite CVE-2010-0859 Remote Oracle Application Object Library Vulnerability 39450 Oracle Communications Industry Suite CVE-2010-0874 Remote Vulnerability 39444 Oracle Industry Product Suite CVE-2010-0862 Remote Vulnerability 39445 Oracle Life Sciences Industry Suite CVE-2010-0876 Remote Vulnerability 39446 Oracle Convergence CVE-2010-0893 Unspecified Remote Vulnerability 39447 Oracle Collaboration Suite CVE-2010-0881 Remote User Interface Components Vulnerability 39443 Oracle Fusion Middleware CVE-2010-0872 Remote Oracle Internet Directory Vulnerability 39437 Oracle Fusion Middleware CVE-2010-0855 Remote Portal Vulnerability 39442 Oracle Fusion Middleware CVE-2010-0856 Remote Portal Vulnerability 39441 PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0879 Remote PeopleTools Vulnerability 39440 Oracle Solaris CVE-2010-0882 Local Trusted Extensions Vulnerability 39439 Oracle Database CVE-2010-0860 Remote Core RDBMS Vulnerability 39432 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0878 PeopleTools Vulnerability 39421 Oracle Database CVE-2010-0852 Remote XML DB Vulnerability 39438 Oracle Transportation Manager CVE-2010-0869 Oracle Transportation Management Remote Vulnerability 39429 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0877 PeopleTools Vulnerability 39434 Oracle Database CVE-2010-0851 Remote XML DB Vulnerability 39428 Oracle Database CVE-2010-0854 Remote Audit Vulnerability 39424 Oracle Database CVE-2010-0866 Remote JavaVM Vulnerability 39436 Oracle E-Business Suite CVE-2010-0858 Remote E-Business Intelligence Vulnerability 39422 Oracle Database CVE-2010-0870 Remote Change Data Capture Vulnerability 39435 Oracle E-Business Suite CVE-2010-0871 Oracle Application Object Library Remote Vulnerability 39427 Oracle Database CVE-2010-0867 Remote JavaVM Vulnerability 39433 Oracle Fusion Middleware CVE-2010-0086 Remote Portal Vulnerability 39425 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0880 PeopleTools Vulnerability 39430 Oracle E-Business Suite CVE-2010-0865 Oracle Agile Engineering Data Management Remote Vulnerability 39423 Oracle E-Business Suite CVE-2010-0868 Oracle iStore Remote Vulnerability 39431 Oracle E-Business Suite CVE-2010-0857 Remote Oracle Workflow Cartridge Vulnerability 39426 Oracle E-Business Suite CVE-2010-0861 Oracle HRMS (Self Service) Remote Vulnerability 37926 Oracle WebLogic Server Node Manager 'beasvc.exe' Remote Command Execution Vulnerability 39418 Oracle Fusion Middleware CVE-2010-0853 Oracle Internet Directory Remote Vulnerability 39420 Oracle Sun Ray Server Software CVE-2010-0888 Remote Device Services Vulnerability 35891 Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability 34961 Cyrus SASL 'sasl_encode64()' Remote Buffer Overflow Vulnerability 38016 Sun Solaris 'CODE_GET_VERSION IOCTL' Local Denial Of Service Vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201004-0739",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "solaris 9 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "solaris 9 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "solaris 8 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "solaris 8 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "solaris 10 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "solaris 10 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.1.1"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "2.0"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.3"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "1.2"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "4.2"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "4.1"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "4.0"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.5"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.1"
},
{
"model": "ray server software",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.0"
},
{
"model": "management center",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.6.1"
},
{
"model": "management center",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "4.0"
},
{
"model": "management center",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.6"
},
{
"model": "java system directory server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.3.1"
},
{
"model": "java system directory server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.0"
},
{
"model": "java system directory server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.3"
},
{
"model": "java system directory server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.2"
},
{
"model": "java system directory server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.1"
},
{
"model": "java system directory server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.0"
},
{
"model": "java system directory server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5"
},
{
"model": "java system directory server patch6",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server patch4",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server patch3",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server patch2",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server 2005q4",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server 2005q1",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server 2004q2",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server 2003q4",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.2"
},
{
"model": "java system directory server 2004q2",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "5.0"
},
{
"model": "java system communications express",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.3"
},
{
"model": "java system communications express 2005q4",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "java system communications express 2005q1",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "java system communications express 2004q2",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "java system communications express",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "0"
},
{
"model": "java system access manager windows",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.1"
},
{
"model": "java system access manager solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.1x86"
},
{
"model": "java system access manager solaris sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.1"
},
{
"model": "java system access manager linux",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.1"
},
{
"model": "java system access manager hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.1"
},
{
"model": "java system access manager 2005q4 windows",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.0"
},
{
"model": "java system access manager 2005q4 solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.0x"
},
{
"model": "java system access manager 2005q4 solaris s",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.0"
},
{
"model": "java system access manager 2005q4 linux",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.0"
},
{
"model": "java system access manager 2005q4 hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "7.0"
},
{
"model": "java system access manager 2005q1",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.3x86"
},
{
"model": "java system access manager 2005q1 sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.3"
},
{
"model": "java system access manager 2005q1 linux",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.3"
},
{
"model": "java system access manager 2004q2 solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.2x"
},
{
"model": "java system access manager 2004q2 solaris s",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.2"
},
{
"model": "java system access manager 2004q2 linux",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.2"
},
{
"model": "java system access manager",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.2"
},
{
"model": "java system access manager",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6.1"
},
{
"model": "java system access manager 2005q1 windows",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6"
},
{
"model": "java system access manager 2005q1 solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6x86"
},
{
"model": "java system access manager 2005q1 solaris spa",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6"
},
{
"model": "java system access manager 2005q1 linux",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6"
},
{
"model": "java system access manager 2005q1 2005q1",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "6"
},
{
"model": "convergence",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "0"
},
{
"model": "cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.1"
},
{
"model": "cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.0"
},
{
"model": "cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "2.2"
},
{
"model": "cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "2.1"
},
{
"model": "cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.2"
},
{
"model": "cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.19/04"
},
{
"model": "cluster",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "3.14/04"
},
{
"model": "transportation manager",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6.0.3"
},
{
"model": "transportation manager",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "5.5.06.00"
},
{
"model": "transportation manager",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "5.5.05.07"
},
{
"model": "thesaurus management system",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "4.6.1"
},
{
"model": "thesaurus management system",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "4.5.2"
},
{
"model": "thesaurus management system",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "4.6"
},
{
"model": "retail plan in-season",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "12.2"
},
{
"model": "retail place in-season",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "12.2"
},
{
"model": "retail markdown optimization",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "13.1"
},
{
"model": "peoplesoft enterprise peopletools",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.49.23"
},
{
"model": "peoplesoft enterprise peopletools",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.49.21"
},
{
"model": "peoplesoft enterprise peopletools",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.49.14"
},
{
"model": "peoplesoft enterprise peopletools",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.49.12"
},
{
"model": "peoplesoft enterprise peopletools",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.49.9"
},
{
"model": "peoplesoft enterprise peopletools",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.50"
},
{
"model": "peoplesoft enterprise peopletools",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.49"
},
{
"model": "oracle9i standard edition .8dv",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2"
},
{
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.8"
},
{
"model": "oracle9i personal edition .8dv",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2"
},
{
"model": "oracle9i enterprise edition .8dv",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2"
},
{
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.8.0"
},
{
"model": "oracle11g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.1.7"
},
{
"model": "oracle11g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.2.0.1.0"
},
{
"model": "oracle11g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.2.0.1.0"
},
{
"model": "oracle11g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.1.0.7"
},
{
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.2.3"
},
{
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.5"
},
{
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.2.0.4"
},
{
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.2.3"
},
{
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.5"
},
{
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.2.0.4"
},
{
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.2.3"
},
{
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.5"
},
{
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.2.0.4"
},
{
"model": "identity management 10g",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.4.3.0"
},
{
"model": "identity management 10g",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.4.0.1"
},
{
"model": "e-business suite",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "1212.1.2"
},
{
"model": "e-business suite",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "1212.1.1"
},
{
"model": "e-business suite",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "1212.0.5"
},
{
"model": "e-business suite",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "1212.0.4"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.10"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.10.2"
},
{
"model": "e-business suite",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "12.0.6"
},
{
"model": "communications unified inventory management",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "7.1"
},
{
"model": "collaboration suite release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.2.4"
},
{
"model": "clinical remote data capture option",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "4.5.3"
},
{
"model": "clinical remote data capture option",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "4.6"
},
{
"model": "application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.2.3"
},
{
"model": "agile engineering data management",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6.1.1.0"
}
],
"sources": [
{
"db": "BID",
"id": "39333"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Oracle",
"sources": [
{
"db": "BID",
"id": "39333"
}
],
"trust": 0.3
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Oracle has released advance notification regarding the April 2010 critical patch update to be released on April 13, 2010. The update addresses 47 vulnerabilities affecting the following software:\nOracle Database\nOracle Fusion Middleware\nOracle Collaboration Suite\nOracle E-Business Suite\nOracle PeopleSoft Enterprise and JD Edwards EnterpriseOne\nOracle Industry Suite\nOracle Solaris Products\nThe following individual records exist to better document these issues:\n39453 Oracle Sun Java System Directory Server CVE-2010-0897 Multiple Remote Vulnerabilities\n39459 Oracle Solaris CVE-2010-0890 Local Vulnerability\n39462 Oracle Sun Management Center CVE-2010-0891 Remote Vulnerability\n39456 Oracle OpenSolaris CVE-2010-0889 Local Information Disclosure Vulnerability\n39461 Oracle Sun Java System Communications Express CVE-2010-0885 Remote Address Book Vulnerability\n39464 Oracle Cluster CVE-2010-0884 Unspecified Local Vulnerability\n39460 Oracle Cluster CVE-2010-0883 Unspecified Local Vulnerability\n39457 Oracle Java System Access Manager CVE-2010-0894 Remote Vulnerability\n39458 Oracle Sun Convergence CVE-2010-0896 Remote Address Book/Mail Filter Vulnerability\n39448 Oracle Industry Products Suite CVE-2010-0864 Remote Retail Place In-Season Vulnerability\n39455 Oracle Solaris CVE-2010-0895 Unspecified Local Vulnerability\n39454 Oracle Industry Product Suite CVE-2010-0863 Oracle Retail Plan In-Season Vulnerability\n39451 Oracle Industry Applications CVE-2010-0875 Remote Thesaurus Management System Vulnerability\n39452 Oracle E-Business Suite CVE-2010-0859 Remote Oracle Application Object Library Vulnerability\n39450 Oracle Communications Industry Suite CVE-2010-0874 Remote Vulnerability\n39444 Oracle Industry Product Suite CVE-2010-0862 Remote Vulnerability\n39445 Oracle Life Sciences Industry Suite CVE-2010-0876 Remote Vulnerability\n39446 Oracle Convergence CVE-2010-0893 Unspecified Remote Vulnerability\n39447 Oracle Collaboration Suite CVE-2010-0881 Remote User Interface Components Vulnerability\n39443 Oracle Fusion Middleware CVE-2010-0872 Remote Oracle Internet Directory Vulnerability\n39437 Oracle Fusion Middleware CVE-2010-0855 Remote Portal Vulnerability\n39442 Oracle Fusion Middleware CVE-2010-0856 Remote Portal Vulnerability\n39441 PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0879 Remote PeopleTools Vulnerability\n39440 Oracle Solaris CVE-2010-0882 Local Trusted Extensions Vulnerability\n39439 Oracle Database CVE-2010-0860 Remote Core RDBMS Vulnerability\n39432 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0878 PeopleTools Vulnerability\n39421 Oracle Database CVE-2010-0852 Remote XML DB Vulnerability\n39438 Oracle Transportation Manager CVE-2010-0869 Oracle Transportation Management Remote Vulnerability\n39429 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0877 PeopleTools Vulnerability\n39434 Oracle Database CVE-2010-0851 Remote XML DB Vulnerability\n39428 Oracle Database CVE-2010-0854 Remote Audit Vulnerability\n39424 Oracle Database CVE-2010-0866 Remote JavaVM Vulnerability\n39436 Oracle E-Business Suite CVE-2010-0858 Remote E-Business Intelligence Vulnerability\n39422 Oracle Database CVE-2010-0870 Remote Change Data Capture Vulnerability\n39435 Oracle E-Business Suite CVE-2010-0871 Oracle Application Object Library Remote Vulnerability\n39427 Oracle Database CVE-2010-0867 Remote JavaVM Vulnerability\n39433 Oracle Fusion Middleware CVE-2010-0086 Remote Portal Vulnerability\n39425 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0880 PeopleTools Vulnerability\n39430 Oracle E-Business Suite CVE-2010-0865 Oracle Agile Engineering Data Management Remote Vulnerability\n39423 Oracle E-Business Suite CVE-2010-0868 Oracle iStore Remote Vulnerability\n39431 Oracle E-Business Suite CVE-2010-0857 Remote Oracle Workflow Cartridge Vulnerability\n39426 Oracle E-Business Suite CVE-2010-0861 Oracle HRMS (Self Service) Remote Vulnerability\n37926 Oracle WebLogic Server Node Manager \u0027beasvc.exe\u0027 Remote Command Execution Vulnerability\n39418 Oracle Fusion Middleware CVE-2010-0853 Oracle Internet Directory Remote Vulnerability\n39420 Oracle Sun Ray Server Software CVE-2010-0888 Remote Device Services Vulnerability\n35891 Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability\n34961 Cyrus SASL \u0027sasl_encode64()\u0027 Remote Buffer Overflow Vulnerability\n38016 Sun Solaris \u0027CODE_GET_VERSION IOCTL\u0027 Local Denial Of Service Vulnerability",
"sources": [
{
"db": "BID",
"id": "39333"
}
],
"trust": 0.3
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "39333",
"trust": 0.3
}
],
"sources": [
{
"db": "BID",
"id": "39333"
}
]
},
"id": "VAR-201004-0739",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.17738096
},
"last_update_date": "2022-05-17T02:01:26.079000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.3,
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2010.html"
},
{
"trust": 0.3,
"url": "http://www.oracle.com"
}
],
"sources": [
{
"db": "BID",
"id": "39333"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "39333"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-04-08T00:00:00",
"db": "BID",
"id": "39333"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-04-15T01:04:00",
"db": "BID",
"id": "39333"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "39333"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RETIRED: Oracle April 2010 Critical Patch Update Multiple Vulnerabilities",
"sources": [
{
"db": "BID",
"id": "39333"
}
],
"trust": 0.3
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "39333"
}
],
"trust": 0.3
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.