vulnerability
Oracle E-Business Suite: CVE-2022-21567: Critical Patch Update
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Jul 19, 2022 | Jul 28, 2022 | Jan 28, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Jul 19, 2022
Added
Jul 28, 2022
Modified
Jan 28, 2025
Description
Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Worklist). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Workflow accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Solutions
oracle-ebs-12_2_10-apply-patch-32980025oracle-ebs-12_2_10-apply-patch-33207251oracle-ebs-12_2_10-apply-patch-33286000oracle-ebs-12_2_10-apply-patch-33625264oracle-ebs-12_2_10-apply-patch-33908208oracle-ebs-12_2_10-apply-patch-34164667oracle-ebs-12_2_10-apply-patch-34196316oracle-ebs-12_2_10-apply-patch-34197573oracle-ebs-12_2_10-apply-patch-34212478oracle-ebs-12_2_11-apply-patch-33568131oracle-ebs-12_2_11-apply-patch-33625264oracle-ebs-12_2_11-apply-patch-33862025oracle-ebs-12_2_11-apply-patch-33908216oracle-ebs-12_2_11-apply-patch-34164667oracle-ebs-12_2_11-apply-patch-34196316oracle-ebs-12_2_11-apply-patch-34197137oracle-ebs-12_2_11-apply-patch-34212478oracle-ebs-12_2_3-apply-patch-33625264oracle-ebs-12_2_4-apply-patch-22261731oracle-ebs-12_2_4-apply-patch-23708498oracle-ebs-12_2_4-apply-patch-26527007oracle-ebs-12_2_4-apply-patch-32979944oracle-ebs-12_2_4-apply-patch-33168623oracle-ebs-12_2_4-apply-patch-33625264oracle-ebs-12_2_4-apply-patch-34164667oracle-ebs-12_2_5-apply-patch-23708596oracle-ebs-12_2_5-apply-patch-25949132oracle-ebs-12_2_5-apply-patch-29747091oracle-ebs-12_2_5-apply-patch-30515569oracle-ebs-12_2_5-apply-patch-31206584oracle-ebs-12_2_5-apply-patch-32979959oracle-ebs-12_2_5-apply-patch-33168635oracle-ebs-12_2_5-apply-patch-33625264oracle-ebs-12_2_5-apply-patch-34164667oracle-ebs-12_2_6-apply-patch-26282050oracle-ebs-12_2_6-apply-patch-30980446oracle-ebs-12_2_6-apply-patch-31206584oracle-ebs-12_2_6-apply-patch-32979890oracle-ebs-12_2_6-apply-patch-33625264oracle-ebs-12_2_6-apply-patch-33908186oracle-ebs-12_2_6-apply-patch-34164667oracle-ebs-12_2_7-apply-patch-26282050oracle-ebs-12_2_7-apply-patch-30980446oracle-ebs-12_2_7-apply-patch-31206584oracle-ebs-12_2_7-apply-patch-32980025oracle-ebs-12_2_7-apply-patch-33245199oracle-ebs-12_2_7-apply-patch-33625264oracle-ebs-12_2_7-apply-patch-33908189oracle-ebs-12_2_7-apply-patch-34164667oracle-ebs-12_2_7-apply-patch-34196316oracle-ebs-12_2_7-apply-patch-34212478oracle-ebs-12_2_8-apply-patch-26282050oracle-ebs-12_2_8-apply-patch-26924701oracle-ebs-12_2_8-apply-patch-30980446oracle-ebs-12_2_8-apply-patch-31206584oracle-ebs-12_2_8-apply-patch-32980025oracle-ebs-12_2_8-apply-patch-33245199oracle-ebs-12_2_8-apply-patch-33625264oracle-ebs-12_2_8-apply-patch-33908189oracle-ebs-12_2_8-apply-patch-34164667oracle-ebs-12_2_8-apply-patch-34196316oracle-ebs-12_2_8-apply-patch-34212478oracle-ebs-12_2_9-apply-patch-26282050oracle-ebs-12_2_9-apply-patch-30980446oracle-ebs-12_2_9-apply-patch-31206584oracle-ebs-12_2_9-apply-patch-32980025oracle-ebs-12_2_9-apply-patch-33245199oracle-ebs-12_2_9-apply-patch-33625264oracle-ebs-12_2_9-apply-patch-33908199oracle-ebs-12_2_9-apply-patch-34164667oracle-ebs-12_2_9-apply-patch-34196316oracle-ebs-12_2_9-apply-patch-34197714oracle-ebs-12_2_9-apply-patch-34212478oracle-ebs-jul-2022-cpu-12_2
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.