SB2024041709 - Multiple vulnerabilities in Oracle Complex Maintenance, Repair, and Overhaul
Published: April 17, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 31 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2024-21046)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
2) Improper input validation (CVE-ID: CVE-2024-21045)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
3) Improper input validation (CVE-ID: CVE-2024-21044)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
4) Improper input validation (CVE-ID: CVE-2024-21043)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
5) Improper input validation (CVE-ID: CVE-2024-21042)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
6) Improper input validation (CVE-ID: CVE-2024-21041)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
7) Improper input validation (CVE-ID: CVE-2024-21040)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
8) Improper input validation (CVE-ID: CVE-2024-21039)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
9) Improper input validation (CVE-ID: CVE-2024-21038)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
10) Improper input validation (CVE-ID: CVE-2024-21037)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
11) Improper input validation (CVE-ID: CVE-2024-21036)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
12) Improper input validation (CVE-ID: CVE-2024-21035)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
13) Improper input validation (CVE-ID: CVE-2024-21034)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
14) Improper input validation (CVE-ID: CVE-2024-21033)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
15) Improper input validation (CVE-ID: CVE-2024-21032)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
16) Improper input validation (CVE-ID: CVE-2024-21031)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
17) Improper input validation (CVE-ID: CVE-2024-21030)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
18) Improper input validation (CVE-ID: CVE-2024-21029)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
19) Improper input validation (CVE-ID: CVE-2024-21028)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
20) Improper input validation (CVE-ID: CVE-2024-21027)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
21) Improper input validation (CVE-ID: CVE-2024-21026)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
22) Improper input validation (CVE-ID: CVE-2024-21025)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
23) Improper input validation (CVE-ID: CVE-2024-21024)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
24) Improper input validation (CVE-ID: CVE-2024-21023)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
25) Improper input validation (CVE-ID: CVE-2024-21022)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
26) Improper input validation (CVE-ID: CVE-2024-21021)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
27) Improper input validation (CVE-ID: CVE-2024-21020)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
28) Improper input validation (CVE-ID: CVE-2024-21019)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
29) Improper input validation (CVE-ID: CVE-2024-21018)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
30) Improper input validation (CVE-ID: CVE-2024-21017)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
31) Improper input validation (CVE-ID: CVE-2024-21016)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the LOV component in Oracle Complex Maintenance, Repair, and Overhaul. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
Remediation
Install update from vendor's website.