cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-21258,https://securityvulnerability.io/vulnerability/CVE-2024-21258,Vulnerability in Oracle Installed Base Could Lead to Unauthorized Data Access,Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).,Oracle,Oracle Installed Base,5.3,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-10-15T19:52:53.669Z,0 CVE-2024-21072,https://securityvulnerability.io/vulnerability/CVE-2024-21072,Vulnerability in Oracle E-Business Suite's Data Provider UI,"An exploitable vulnerability exists in the Oracle Installed Base component of Oracle E-Business Suite, specifically in the Data Provider UI. This flaw allows unauthenticated attackers, upon gaining network access via HTTP, to potentially compromise the system. The attack requires human interaction from a user other than the attacker. While the vulnerability resides within the Oracle Installed Base, successful exploitation may impact additional components, leading to unauthorized data updates, insertions, deletions, and unauthorized read access to certain data. This poses risks to both confidentiality and integrity of the data managed by Oracle Installed Base.",Oracle,Installed Base,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-16T22:15:00.000Z,0 CVE-2024-20958,https://securityvulnerability.io/vulnerability/CVE-2024-20958,Oracle E-Business Suite Vulnerability Affects Confidentiality and Integrity,"Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: Engineering Change Order). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data as well as unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).",Oracle,Installed Base,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-17T01:50:17.747Z,0 CVE-2024-20941,https://securityvulnerability.io/vulnerability/CVE-2024-20941,Oracle E-Business Suite Vulnerability Affects Confidentiality and Integrity,"Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: HTML UI). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data as well as unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).",Oracle,Installed Base,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-17T01:50:14.707Z,0 CVE-2024-20935,https://securityvulnerability.io/vulnerability/CVE-2024-20935,Oracle E-Business Suite Vulnerability Affects Confidentiality and Integrity,"Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: Engineering Change Order). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data as well as unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).",Oracle,Installed Base,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-17T01:50:13.606Z,0 CVE-2024-20933,https://securityvulnerability.io/vulnerability/CVE-2024-20933,Oracle E-Business Suite Vulnerability Affects Confidentiality and Integrity,"Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: Engineering Change Order). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data as well as unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).",Oracle,Installed Base,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-17T01:50:13.253Z,0 CVE-2024-20934,https://securityvulnerability.io/vulnerability/CVE-2024-20934,Unauthenticated Access Vulnerability in Oracle E-Business Suite's Installed Base Component,"A vulnerability exists in the Oracle Installed Base component of the Oracle E-Business Suite that allows unauthenticated attackers with network access via HTTP to compromise sensitive data. Successful exploitation hinges on human interaction from an uninvolved party and can lead to unauthorized data manipulation, including the ability to update, insert, or delete data. Although the vulnerability resides within the Oracle Installed Base, the consequences may extend to other products, thereby broadening the scope of potential impacts.",Oracle,Installed Base,6.1,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-01-16T21:41:17.683Z,0 CVE-2022-21251,https://securityvulnerability.io/vulnerability/CVE-2022-21251,Vulnerability in Oracle E-Business Suite's Installed Base Component,"The Oracle E-Business Suite's Installed Base component is susceptible to a vulnerability that enables an unauthenticated attacker to exploit network access via HTTP. This allows the potential for unauthorized manipulation, resulting in the ability to cause significant disruptions, such as application hangs or repeatable crashes, which can lead to a complete denial of service scenario. Organizations using the impacted versions (12.2.3 through 12.2.11) should implement security measures promptly to mitigate associated risks.",Oracle,Installed Base,7.5,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2022-01-19T11:22:06.000Z,0 CVE-2021-2231,https://securityvulnerability.io/vulnerability/CVE-2021-2231,Access Control Vulnerability in Oracle Installed Base of Oracle E-Business Suite,"A significant access control vulnerability exists in the API component of the Oracle Installed Base within the Oracle E-Business Suite. This flaw permits low-privileged attackers with network access via HTTP to exploit the system, leading to unauthorized capabilities for creating, deleting, or modifying critical data. Organizations may face severe risks as this vulnerability allows unauthorized access to sensitive information across the Oracle Installed Base, making it essential for users to implement security measures and apply necessary patches as advised by Oracle.",Oracle,Installed Base,8.1,HIGH,0.0009399999980814755,false,,false,false,false,,,false,false,,2021-04-22T21:53:53.000Z,0 CVE-2021-2023,https://securityvulnerability.io/vulnerability/CVE-2021-2023,Vulnerability in Oracle E-Business Suite APIs Affects Oracle Installed Base,"A vulnerability exists in the Oracle Installed Base component of the Oracle E-Business Suite, where an unauthenticated attacker with network access via HTTP may exploit it. The attack requires human interaction from an individual other than the attacker, leading to potential unauthorized changes to data, including updates, inserts, and deletions. Although this vulnerability primarily affects the Installed Base, the ramifications can extend to other related Oracle products, emphasizing the need for awareness and remediation.",Oracle,Installed Base,4.7,MEDIUM,0.0008999999845400453,false,,false,false,false,,,false,false,,2021-01-20T14:50:02.000Z,0 CVE-2020-14822,https://securityvulnerability.io/vulnerability/CVE-2020-14822,Vulnerability in Oracle E-Business Suite APIs Exposes User Data,"A vulnerability exists in the Oracle Installed Base component of Oracle E-Business Suite, impacting versions 12.1 and 12.2. This issue allows an unauthenticated attacker with network access through HTTP to exploit the system, provided there is human interaction from another individual. The flaw enables unauthorized users to perform update, insert, or delete operations on sensitive data accessible within Oracle Installed Base, potentially leading to widespread data manipulation and integrity issues across related products.",Oracle,Installed Base,4.7,MEDIUM,0.0008999999845400453,false,,false,false,false,,,false,false,,2020-10-21T14:04:27.000Z,0 CVE-2019-3024,https://securityvulnerability.io/vulnerability/CVE-2019-3024,Oracle E-Business Suite Vulnerability in Installed Base Product,"An unauthenticated attacker with network access can exploit a vulnerability in the Oracle Installed Base component of Oracle E-Business Suite, specifically affecting versions 12.2.3 to 12.2.9. The vulnerability requires human interaction from a third party to successfully initiate an attack. An exploit can lead to unauthorized modifications to accessible data within the Oracle Installed Base, potentially impacting other interconnected products. Proper security measures are essential to mitigate risks associated with this vulnerability.",Oracle,Installed Base,4.7,MEDIUM,0.0008299999753944576,false,,false,false,false,,,false,false,,2019-10-16T17:40:59.000Z,0 CVE-2017-3361,https://securityvulnerability.io/vulnerability/CVE-2017-3361,,"Vulnerability in the Oracle Installed Base component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Installed Base accessible data as well as unauthorized update, insert or delete access to some of Oracle Installed Base accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).",Oracle,Installed Base,8.2,HIGH,0.001970000099390745,false,,false,false,false,,,false,false,,2017-01-27T22:01:00.000Z,0 CVE-2016-3534,https://securityvulnerability.io/vulnerability/CVE-2016-3534,,"Unspecified vulnerability in the Oracle Installed Base component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via vectors related to Engineering Change Order. NOTE: the previous information is from the July 2016 CPU. Oracle has not commented on third-party claims that this issue involves an open redirect vulnerability, which allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.",Oracle,Installed Base,4.7,MEDIUM,0.0024800000246614218,false,,false,false,false,,,false,false,,2016-07-21T10:00:00.000Z,0