VAR-201004-0739

Vulnerability from variot - Updated: 2022-05-17 02:01

Oracle has released advance notification regarding the April 2010 critical patch update to be released on April 13, 2010. The update addresses 47 vulnerabilities affecting the following software: Oracle Database Oracle Fusion Middleware Oracle Collaboration Suite Oracle E-Business Suite Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Oracle Industry Suite Oracle Solaris Products The following individual records exist to better document these issues: 39453 Oracle Sun Java System Directory Server CVE-2010-0897 Multiple Remote Vulnerabilities 39459 Oracle Solaris CVE-2010-0890 Local Vulnerability 39462 Oracle Sun Management Center CVE-2010-0891 Remote Vulnerability 39456 Oracle OpenSolaris CVE-2010-0889 Local Information Disclosure Vulnerability 39461 Oracle Sun Java System Communications Express CVE-2010-0885 Remote Address Book Vulnerability 39464 Oracle Cluster CVE-2010-0884 Unspecified Local Vulnerability 39460 Oracle Cluster CVE-2010-0883 Unspecified Local Vulnerability 39457 Oracle Java System Access Manager CVE-2010-0894 Remote Vulnerability 39458 Oracle Sun Convergence CVE-2010-0896 Remote Address Book/Mail Filter Vulnerability 39448 Oracle Industry Products Suite CVE-2010-0864 Remote Retail Place In-Season Vulnerability 39455 Oracle Solaris CVE-2010-0895 Unspecified Local Vulnerability 39454 Oracle Industry Product Suite CVE-2010-0863 Oracle Retail Plan In-Season Vulnerability 39451 Oracle Industry Applications CVE-2010-0875 Remote Thesaurus Management System Vulnerability 39452 Oracle E-Business Suite CVE-2010-0859 Remote Oracle Application Object Library Vulnerability 39450 Oracle Communications Industry Suite CVE-2010-0874 Remote Vulnerability 39444 Oracle Industry Product Suite CVE-2010-0862 Remote Vulnerability 39445 Oracle Life Sciences Industry Suite CVE-2010-0876 Remote Vulnerability 39446 Oracle Convergence CVE-2010-0893 Unspecified Remote Vulnerability 39447 Oracle Collaboration Suite CVE-2010-0881 Remote User Interface Components Vulnerability 39443 Oracle Fusion Middleware CVE-2010-0872 Remote Oracle Internet Directory Vulnerability 39437 Oracle Fusion Middleware CVE-2010-0855 Remote Portal Vulnerability 39442 Oracle Fusion Middleware CVE-2010-0856 Remote Portal Vulnerability 39441 PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0879 Remote PeopleTools Vulnerability 39440 Oracle Solaris CVE-2010-0882 Local Trusted Extensions Vulnerability 39439 Oracle Database CVE-2010-0860 Remote Core RDBMS Vulnerability 39432 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0878 PeopleTools Vulnerability 39421 Oracle Database CVE-2010-0852 Remote XML DB Vulnerability 39438 Oracle Transportation Manager CVE-2010-0869 Oracle Transportation Management Remote Vulnerability 39429 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0877 PeopleTools Vulnerability 39434 Oracle Database CVE-2010-0851 Remote XML DB Vulnerability 39428 Oracle Database CVE-2010-0854 Remote Audit Vulnerability 39424 Oracle Database CVE-2010-0866 Remote JavaVM Vulnerability 39436 Oracle E-Business Suite CVE-2010-0858 Remote E-Business Intelligence Vulnerability 39422 Oracle Database CVE-2010-0870 Remote Change Data Capture Vulnerability 39435 Oracle E-Business Suite CVE-2010-0871 Oracle Application Object Library Remote Vulnerability 39427 Oracle Database CVE-2010-0867 Remote JavaVM Vulnerability 39433 Oracle Fusion Middleware CVE-2010-0086 Remote Portal Vulnerability 39425 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0880 PeopleTools Vulnerability 39430 Oracle E-Business Suite CVE-2010-0865 Oracle Agile Engineering Data Management Remote Vulnerability 39423 Oracle E-Business Suite CVE-2010-0868 Oracle iStore Remote Vulnerability 39431 Oracle E-Business Suite CVE-2010-0857 Remote Oracle Workflow Cartridge Vulnerability 39426 Oracle E-Business Suite CVE-2010-0861 Oracle HRMS (Self Service) Remote Vulnerability 37926 Oracle WebLogic Server Node Manager 'beasvc.exe' Remote Command Execution Vulnerability 39418 Oracle Fusion Middleware CVE-2010-0853 Oracle Internet Directory Remote Vulnerability 39420 Oracle Sun Ray Server Software CVE-2010-0888 Remote Device Services Vulnerability 35891 Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability 34961 Cyrus SASL 'sasl_encode64()' Remote Buffer Overflow Vulnerability 38016 Sun Solaris 'CODE_GET_VERSION IOCTL' Local Denial Of Service Vulnerability

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201004-0739",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 9 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 10 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 10 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.1.1"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.0"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "1.3"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "1.2"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4.2"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4.1"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4.0"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.5"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.1"
      },
      {
        "model": "ray server software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.0"
      },
      {
        "model": "management center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.6.1"
      },
      {
        "model": "management center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4.0"
      },
      {
        "model": "management center",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.6"
      },
      {
        "model": "java system directory server enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.3.1"
      },
      {
        "model": "java system directory server enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "java system directory server enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.3"
      },
      {
        "model": "java system directory server enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.2"
      },
      {
        "model": "java system directory server enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.1"
      },
      {
        "model": "java system directory server enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.0"
      },
      {
        "model": "java system directory server enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5"
      },
      {
        "model": "java system directory server patch6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server patch4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server patch3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server patch2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server 2005q4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server 2005q1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server 2004q2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server 2003q4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.2"
      },
      {
        "model": "java system directory server 2004q2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.0"
      },
      {
        "model": "java system communications express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.3"
      },
      {
        "model": "java system communications express 2005q4",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "java system communications express 2005q1",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "java system communications express 2004q2",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "java system communications express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "0"
      },
      {
        "model": "java system access manager windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.1"
      },
      {
        "model": "java system access manager solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.1x86"
      },
      {
        "model": "java system access manager solaris sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.1"
      },
      {
        "model": "java system access manager linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.1"
      },
      {
        "model": "java system access manager hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.1"
      },
      {
        "model": "java system access manager 2005q4 windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "java system access manager 2005q4 solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.0x"
      },
      {
        "model": "java system access manager 2005q4 solaris s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "java system access manager 2005q4 linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "java system access manager 2005q4 hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "java system access manager 2005q1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.3x86"
      },
      {
        "model": "java system access manager 2005q1 sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.3"
      },
      {
        "model": "java system access manager 2005q1 linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.3"
      },
      {
        "model": "java system access manager 2004q2 solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.2x"
      },
      {
        "model": "java system access manager 2004q2 solaris s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.2"
      },
      {
        "model": "java system access manager 2004q2 linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.2"
      },
      {
        "model": "java system access manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.2"
      },
      {
        "model": "java system access manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6.1"
      },
      {
        "model": "java system access manager 2005q1 windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6"
      },
      {
        "model": "java system access manager 2005q1 solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6x86"
      },
      {
        "model": "java system access manager 2005q1 solaris spa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6"
      },
      {
        "model": "java system access manager 2005q1 linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6"
      },
      {
        "model": "java system access manager 2005q1 2005q1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "6"
      },
      {
        "model": "convergence",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "0"
      },
      {
        "model": "cluster",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.1"
      },
      {
        "model": "cluster",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.0"
      },
      {
        "model": "cluster",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.2"
      },
      {
        "model": "cluster",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.1"
      },
      {
        "model": "cluster",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.2"
      },
      {
        "model": "cluster",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.19/04"
      },
      {
        "model": "cluster",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3.14/04"
      },
      {
        "model": "transportation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6.0.3"
      },
      {
        "model": "transportation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "5.5.06.00"
      },
      {
        "model": "transportation manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "5.5.05.07"
      },
      {
        "model": "thesaurus management system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "4.6.1"
      },
      {
        "model": "thesaurus management system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "4.5.2"
      },
      {
        "model": "thesaurus management system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "4.6"
      },
      {
        "model": "retail plan in-season",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "12.2"
      },
      {
        "model": "retail place in-season",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "12.2"
      },
      {
        "model": "retail markdown optimization",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "13.1"
      },
      {
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.49.23"
      },
      {
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.49.21"
      },
      {
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.49.14"
      },
      {
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.49.12"
      },
      {
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.49.9"
      },
      {
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.50"
      },
      {
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "8.49"
      },
      {
        "model": "oracle9i standard edition .8dv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "9.2"
      },
      {
        "model": "oracle9i standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "9.2.8"
      },
      {
        "model": "oracle9i personal edition .8dv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "9.2"
      },
      {
        "model": "oracle9i enterprise edition .8dv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "9.2"
      },
      {
        "model": "oracle9i enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "9.2.8.0"
      },
      {
        "model": "oracle11g standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "11.1.7"
      },
      {
        "model": "oracle11g standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "11.2.0.1.0"
      },
      {
        "model": "oracle11g enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "11.2.0.1.0"
      },
      {
        "model": "oracle11g enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "11.1.0.7"
      },
      {
        "model": "oracle10g standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.2.3"
      },
      {
        "model": "oracle10g standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.1.0.5"
      },
      {
        "model": "oracle10g standard edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.2.0.4"
      },
      {
        "model": "oracle10g personal edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.2.3"
      },
      {
        "model": "oracle10g personal edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.1.5"
      },
      {
        "model": "oracle10g personal edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.2.0.4"
      },
      {
        "model": "oracle10g enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.2.3"
      },
      {
        "model": "oracle10g enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.1.5"
      },
      {
        "model": "oracle10g enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.2.0.4"
      },
      {
        "model": "identity management 10g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.1.4.3.0"
      },
      {
        "model": "identity management 10g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.1.4.0.1"
      },
      {
        "model": "e-business suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1212.1.2"
      },
      {
        "model": "e-business suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1212.1.1"
      },
      {
        "model": "e-business suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1212.0.5"
      },
      {
        "model": "e-business suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "1212.0.4"
      },
      {
        "model": "e-business suite 11i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "11.5.10"
      },
      {
        "model": "e-business suite 11i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "11.5.10.2"
      },
      {
        "model": "e-business suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "12.0.6"
      },
      {
        "model": "communications unified inventory management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "7.1"
      },
      {
        "model": "collaboration suite release",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.1.2.4"
      },
      {
        "model": "clinical remote data capture option",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "4.5.3"
      },
      {
        "model": "clinical remote data capture option",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "4.6"
      },
      {
        "model": "application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "10.1.2.3"
      },
      {
        "model": "agile engineering data management",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6.1.1.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "39333"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Oracle",
    "sources": [
      {
        "db": "BID",
        "id": "39333"
      }
    ],
    "trust": 0.3
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Oracle has released advance notification regarding the April 2010 critical patch update to be released on April 13, 2010. The update addresses 47 vulnerabilities affecting the following software:\nOracle Database\nOracle Fusion Middleware\nOracle Collaboration Suite\nOracle E-Business Suite\nOracle PeopleSoft Enterprise and JD Edwards EnterpriseOne\nOracle Industry Suite\nOracle Solaris Products\nThe following individual records exist to better document these issues:\n39453 Oracle Sun Java System Directory Server CVE-2010-0897 Multiple Remote Vulnerabilities\n39459 Oracle Solaris CVE-2010-0890 Local Vulnerability\n39462 Oracle Sun Management Center CVE-2010-0891 Remote Vulnerability\n39456 Oracle OpenSolaris CVE-2010-0889 Local Information Disclosure Vulnerability\n39461 Oracle Sun Java System Communications Express CVE-2010-0885 Remote Address Book Vulnerability\n39464 Oracle Cluster CVE-2010-0884 Unspecified Local Vulnerability\n39460 Oracle Cluster CVE-2010-0883 Unspecified Local Vulnerability\n39457 Oracle Java System Access Manager CVE-2010-0894 Remote Vulnerability\n39458 Oracle Sun Convergence CVE-2010-0896 Remote Address Book/Mail Filter Vulnerability\n39448 Oracle Industry Products Suite CVE-2010-0864 Remote Retail Place In-Season Vulnerability\n39455 Oracle Solaris CVE-2010-0895 Unspecified Local Vulnerability\n39454 Oracle Industry Product Suite CVE-2010-0863 Oracle Retail Plan In-Season Vulnerability\n39451 Oracle Industry Applications CVE-2010-0875 Remote Thesaurus Management System Vulnerability\n39452 Oracle E-Business Suite CVE-2010-0859 Remote Oracle Application Object Library Vulnerability\n39450 Oracle Communications Industry Suite CVE-2010-0874 Remote Vulnerability\n39444 Oracle Industry Product Suite CVE-2010-0862 Remote Vulnerability\n39445 Oracle Life Sciences Industry Suite CVE-2010-0876 Remote Vulnerability\n39446 Oracle Convergence CVE-2010-0893 Unspecified Remote Vulnerability\n39447 Oracle Collaboration Suite CVE-2010-0881 Remote User Interface Components Vulnerability\n39443 Oracle Fusion Middleware CVE-2010-0872 Remote Oracle Internet Directory Vulnerability\n39437 Oracle Fusion Middleware CVE-2010-0855 Remote Portal Vulnerability\n39442 Oracle Fusion Middleware CVE-2010-0856 Remote Portal Vulnerability\n39441 PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0879 Remote PeopleTools Vulnerability\n39440 Oracle Solaris CVE-2010-0882 Local Trusted Extensions Vulnerability\n39439 Oracle Database CVE-2010-0860 Remote Core RDBMS Vulnerability\n39432 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0878 PeopleTools Vulnerability\n39421 Oracle Database CVE-2010-0852 Remote XML DB Vulnerability\n39438 Oracle Transportation Manager CVE-2010-0869 Oracle Transportation Management Remote Vulnerability\n39429 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0877 PeopleTools Vulnerability\n39434 Oracle Database CVE-2010-0851 Remote XML DB Vulnerability\n39428 Oracle Database CVE-2010-0854 Remote Audit Vulnerability\n39424 Oracle Database CVE-2010-0866 Remote JavaVM Vulnerability\n39436 Oracle E-Business Suite CVE-2010-0858 Remote E-Business Intelligence Vulnerability\n39422 Oracle Database CVE-2010-0870 Remote Change Data Capture Vulnerability\n39435 Oracle E-Business Suite CVE-2010-0871 Oracle Application Object Library Remote Vulnerability\n39427 Oracle Database CVE-2010-0867 Remote JavaVM Vulnerability\n39433 Oracle Fusion Middleware CVE-2010-0086 Remote Portal Vulnerability\n39425 Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne CVE-2010-0880 PeopleTools Vulnerability\n39430 Oracle E-Business Suite CVE-2010-0865 Oracle Agile Engineering Data Management Remote Vulnerability\n39423 Oracle E-Business Suite CVE-2010-0868 Oracle iStore Remote Vulnerability\n39431 Oracle E-Business Suite CVE-2010-0857 Remote Oracle Workflow Cartridge Vulnerability\n39426 Oracle E-Business Suite CVE-2010-0861 Oracle HRMS (Self Service) Remote Vulnerability\n37926 Oracle WebLogic Server Node Manager \u0027beasvc.exe\u0027 Remote Command Execution Vulnerability\n39418 Oracle Fusion Middleware CVE-2010-0853 Oracle Internet Directory Remote Vulnerability\n39420 Oracle Sun Ray Server Software CVE-2010-0888 Remote Device Services Vulnerability\n35891 Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability\n34961 Cyrus SASL \u0027sasl_encode64()\u0027 Remote Buffer Overflow Vulnerability\n38016 Sun Solaris \u0027CODE_GET_VERSION IOCTL\u0027 Local Denial Of Service Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "39333"
      }
    ],
    "trust": 0.3
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "39333",
        "trust": 0.3
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "39333"
      }
    ]
  },
  "id": "VAR-201004-0739",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.17738096
  },
  "last_update_date": "2022-05-17T02:01:26.079000Z",
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 0.3,
        "url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2010.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.oracle.com"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "39333"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "39333"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-04-08T00:00:00",
        "db": "BID",
        "id": "39333"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-04-15T01:04:00",
        "db": "BID",
        "id": "39333"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "39333"
      }
    ],
    "trust": 0.3
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RETIRED: Oracle April 2010 Critical Patch Update Multiple Vulnerabilities",
    "sources": [
      {
        "db": "BID",
        "id": "39333"
      }
    ],
    "trust": 0.3
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "39333"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…