CVE-2022-21500 : Oracle Security Alert Advisory

Description

This Security Alert addresses vulnerability CVE-2022-21500, which affects some deployments of Oracle E-Business Suite. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. If successfully exploited, this vulnerability may result in the exposure of personally identifiable information (PII).

Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.

Oracle SaaS cloud environments are not affected by this vulnerability. This vulnerability could affect the E-Business Suite deployments of Oracle Managed Cloud Services customers. Oracle Managed Cloud Services customers should consult their account team for assistance.

For more information

https://www.oracle.com/security-alerts/alert-cve-2022-21500.html

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2022-32532 : APACHE SHIRO UP TO 1.9.0 REGEXREQUESTMATCHER AUTHORIZATION

CVE-2022-32532 : APACHE SHIRO UP TO 1.9.0 REGEXREQUESTMATCHER AUTHORIZATION

Description Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher

CVE-2022-31104 : WASMTIME CALCULATION

CVE-2022-31104 : WASMTIME CALCULATION

Description Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime’s implementation of the SIMD proposal for WebAssembly on

CVE-2022-33146 : WEB2PY UP TO 2.22.4 URL REDIRECT

CVE-2022-33146 : WEB2PY UP TO 2.22.4 URL REDIRECT

Description Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an