Date: 2025-04-16
Niveau de risque maximal: Critical
Exploitation à distance: Oui
Exploitation locale: Oui
Exécution de code: Oui
La compagnie Oracle a publié des bulletins de sécurité qui concernent de multiples vulnérabilités affectant plusieurs de ses produits. L’exploitation de ces failles pourrait permettre à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité, une exécution de code arbitraire, une atteinte à la confidentialité et l'intégrité des données et compromettre un produit vulnérable.
Produits vulnérables:
- Management Cloud Engine
- Oracle Communications Cloud Native Core Network Data Analytics Function
- Oracle Communications Cloud Native Core Network Function Cloud Native Environment
- Oracle Communications Element Manager
- Oracle Communications Policy Management
- Oracle Communications Session Report Manager
- Oracle SD-WAN Edge
- Oracle Communications Cloud Native Core Unified Data Repository
- Oracle Communications Session Border Controller
- Oracle Enterprise Communications Broker
- Oracle Communications Network Analytics Data Director
- Oracle Communications Cloud Native Core Binding Support Function
- Oracle Communications Cloud Native Core DBTier
- Oracle Communications Cloud Native Core Policy
- Oracle Communications Cloud Native Core Certificate Management
- Oracle Communications Cloud Native Core Console
- Oracle Communications Cloud Native Core Network Repository Function
- Oracle Communications Cloud Native Core Security Edge Protection Proxy
- Oracle Communications Cloud Native Core Service Communication Proxy
- Oracle Communications EAGLE Element Management System
- Oracle Communications Operations Monitor
- Oracle Communications User Data Repository
- Primavera Gateway
- Oracle Scripting
- Oracle Application Object Library
- Oracle Common Applications
- Oracle Configurator
- Oracle iStore
- Oracle User Management
- Oracle Enterprise Manager Base Platform
- Oracle Application Testing Suite
- Oracle Financial Services Model Management and Governance
- Oracle Banking APIs
- Oracle Banking Digital Experience
- Oracle Financial Services Analytical Applications Infrastructure
- Oracle Financial Services Revenue Management and Billing
- Oracle SOA Suite
- Oracle WebCenter Forms Recognition
- Oracle WebCenter Portal
- Oracle Business Process Management Suite
- Oracle Business Intelligence Enterprise Edition
- Oracle BI Publisher
- Oracle Hospitality Cruise Shipboard Property Management System
- Oracle Hyperion Infrastructure Technology
- Oracle Documaker
- Oracle GraalVM for JDK
- Oracle Java SE, Oracle GraalVM Enterprise Edition
- Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- MySQL Connectors
- PeopleSoft Enterprise CC Common Application Objects
- PeopleSoft Enterprise PeopleTools
- Oracle Policy Automation
- Oracle Retail Store Inventory Management
- Oracle Retail Xstore Point of Service
- Siebel CRM Deployment
- Oracle Agile Engineering Data Management
- Oracle Demantra Demand Management
- OSS Support Tools
- Oracle Solaris
- Oracle Utilities Application Framework
- Oracle VM VirtualBox
CVE: CVE-2025-30736, CVE-2024-24549, CVE-2024-39338, CVE-2025-30701, CVE-2025-24970, CVE-2025-24813, CVE-2021-23450, CVE-2024-38819, CVE-2024-52046, CVE-2025-24813, CVE-2024-40896, CVE-2025-24970, CVE-2024-28168, CVE-2025-24970, CVE-2024-57699, CVE-2024-43709, CVE-2024-7254, CVE-2024-47072, CVE-2024-56337, CVE-2024-52046, CVE-2024-56337, CVE-2025-1974, CVE-2025-24813, CVE-2025-24813, CVE-2025-24813, CVE-2025-24813, CVE-2024-40896, CVE-2024-40896, CVE-2024-5535, CVE-2024-5535, CVE-2024-25638, CVE-2024-43044, CVE-2025-27516, CVE-2025-24928, CVE-2025-27516, CVE-2025-27516, CVE-2024-7254, CVE-2024-1135, CVE-2025-24970, CVE-2024-47072, CVE-2024-57699, CVE-2025-24970, CVE-2025-24970, CVE-2024-52303, CVE-2024-38819, CVE-2024-47072, CVE-2024-7254, CVE-2025-24970, CVE-2023-5685, CVE-2024-47072, CVE-2024-1135, CVE-2025-24970, CVE-2024-47072, CVE-2024-21538, CVE-2024-57699, CVE-2024-7254, CVE-2024-57699, CVE-2025-24970, CVE-2024-49767, CVE-2024-57699, CVE-2024-47072, CVE-2025-24970, CVE-2025-23184, CVE-2024-28168, CVE-2024-38819, CVE-2024-49767, CVE-2024-47072, CVE-2024-57699, CVE-2024-52303, CVE-2024-28168, CVE-2024-47072, CVE-2024-4227, CVE-2024-4227, CVE-2024-7254, CVE-2024-38819, CVE-2024-7254, CVE-2024-57699, CVE-2024-38819, CVE-2024-57699, CVE-2025-30727, CVE-2025-30730, CVE-2025-30716, CVE-2025-30728, CVE-2025-30707, CVE-2025-30708, CVE-2022-45047, CVE-2024-52046, CVE-2024-57699, CVE-2023-1370, CVE-2025-30686, VE-2024-52046, CVE-2024-52046, CVE-2024-38476, CVE-2024-52046, CVE-2024-56337, CVE-2024-47561, CVE-2024-40896, CVE-2024-11053, CVE-2020-13936, CVE-2025-27363, CVE-2024-28168, CVE-2025-24970, CVE-2024-7254, CVE-2023-26464, CVE-2020-25649, CVE-2024-29857, CVE-2025-23184, CVE-2024-47072, CVE-2024-47561, CVE-2024-52046, CVE-2023-24998, CVE-2025-30724, CVE-2024-32007, CVE-2023-52428, CVE-2024-30172, CVE-2024-52316, CVE-2024-11053, CVE-2024-38819, CVE-2025-23083, CVE-2024-54534, CVE-2024-47606, CVE-2025-21587, CVE-2024-23807, CVE-2024-5535, CVE-2024-40896, CVE-2025-30706, CVE-2024-7254, CVE-2025-30735, CVE-2023-52428, CVE-2024-57699, CVE-2022-34381, CVE-2024-22243, CVE-2023-24998, CVE-2023-46589, CVE-2024-47197, CVE-2024-56337, CVE-2023-37536, CVE-2024-52046, CVE-2025-30690, CVE-2025-30690, CVE-2024-47072, CVE-2025-30712