vulnerability
Oracle E-Business Suite: CVE-2022-21567: Critical Patch Update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | 2022-07-19 | 2022-07-28 | 2025-01-28 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
2022-07-19
Added
2022-07-28
Modified
2025-01-28
Description
Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Worklist). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Workflow accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Solution(s)
oracle-ebs-12_2_10-apply-patch-32980025oracle-ebs-12_2_10-apply-patch-33207251oracle-ebs-12_2_10-apply-patch-33286000oracle-ebs-12_2_10-apply-patch-33625264oracle-ebs-12_2_10-apply-patch-33908208oracle-ebs-12_2_10-apply-patch-34164667oracle-ebs-12_2_10-apply-patch-34196316oracle-ebs-12_2_10-apply-patch-34197573oracle-ebs-12_2_10-apply-patch-34212478oracle-ebs-12_2_11-apply-patch-33568131oracle-ebs-12_2_11-apply-patch-33625264oracle-ebs-12_2_11-apply-patch-33862025oracle-ebs-12_2_11-apply-patch-33908216oracle-ebs-12_2_11-apply-patch-34164667oracle-ebs-12_2_11-apply-patch-34196316oracle-ebs-12_2_11-apply-patch-34197137oracle-ebs-12_2_11-apply-patch-34212478oracle-ebs-12_2_3-apply-patch-33625264oracle-ebs-12_2_4-apply-patch-22261731oracle-ebs-12_2_4-apply-patch-23708498oracle-ebs-12_2_4-apply-patch-26527007oracle-ebs-12_2_4-apply-patch-32979944oracle-ebs-12_2_4-apply-patch-33168623oracle-ebs-12_2_4-apply-patch-33625264oracle-ebs-12_2_4-apply-patch-34164667oracle-ebs-12_2_5-apply-patch-23708596oracle-ebs-12_2_5-apply-patch-25949132oracle-ebs-12_2_5-apply-patch-29747091oracle-ebs-12_2_5-apply-patch-30515569oracle-ebs-12_2_5-apply-patch-31206584oracle-ebs-12_2_5-apply-patch-32979959oracle-ebs-12_2_5-apply-patch-33168635oracle-ebs-12_2_5-apply-patch-33625264oracle-ebs-12_2_5-apply-patch-34164667oracle-ebs-12_2_6-apply-patch-26282050oracle-ebs-12_2_6-apply-patch-30980446oracle-ebs-12_2_6-apply-patch-31206584oracle-ebs-12_2_6-apply-patch-32979890oracle-ebs-12_2_6-apply-patch-33625264oracle-ebs-12_2_6-apply-patch-33908186oracle-ebs-12_2_6-apply-patch-34164667oracle-ebs-12_2_7-apply-patch-26282050oracle-ebs-12_2_7-apply-patch-30980446oracle-ebs-12_2_7-apply-patch-31206584oracle-ebs-12_2_7-apply-patch-32980025oracle-ebs-12_2_7-apply-patch-33245199oracle-ebs-12_2_7-apply-patch-33625264oracle-ebs-12_2_7-apply-patch-33908189oracle-ebs-12_2_7-apply-patch-34164667oracle-ebs-12_2_7-apply-patch-34196316oracle-ebs-12_2_7-apply-patch-34212478oracle-ebs-12_2_8-apply-patch-26282050oracle-ebs-12_2_8-apply-patch-26924701oracle-ebs-12_2_8-apply-patch-30980446oracle-ebs-12_2_8-apply-patch-31206584oracle-ebs-12_2_8-apply-patch-32980025oracle-ebs-12_2_8-apply-patch-33245199oracle-ebs-12_2_8-apply-patch-33625264oracle-ebs-12_2_8-apply-patch-33908189oracle-ebs-12_2_8-apply-patch-34164667oracle-ebs-12_2_8-apply-patch-34196316oracle-ebs-12_2_8-apply-patch-34212478oracle-ebs-12_2_9-apply-patch-26282050oracle-ebs-12_2_9-apply-patch-30980446oracle-ebs-12_2_9-apply-patch-31206584oracle-ebs-12_2_9-apply-patch-32980025oracle-ebs-12_2_9-apply-patch-33245199oracle-ebs-12_2_9-apply-patch-33625264oracle-ebs-12_2_9-apply-patch-33908199oracle-ebs-12_2_9-apply-patch-34164667oracle-ebs-12_2_9-apply-patch-34196316oracle-ebs-12_2_9-apply-patch-34197714oracle-ebs-12_2_9-apply-patch-34212478oracle-ebs-jul-2022-cpu-12_2

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.