Oracle Corporation Configurator vulnerabilities
7 known vulnerabilities affecting oracle_corporation/configurator.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH6MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2022-21255HIGHCVSS 8.1v12.2.3-12.2.112022-01-19
CVE-2022-21255 [HIGH] CVE-2022-21255: Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: UI Servlet).
Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: UI Servlet). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized creatio
cvelistv5nvd
CVE-2021-2080HIGHCVSS 8.2v12.1v12.22021-01-20
CVE-2021-2080 [HIGH] CVE-2021-2080: Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Sup
Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacke
cvelistv5nvd
CVE-2021-2079HIGHCVSS 8.2v12.1v12.22021-01-20
CVE-2021-2079 [HIGH] CVE-2021-2079: Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Sup
Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacke
cvelistv5nvd
CVE-2021-2078HIGHCVSS 8.2v12.1v12.22021-01-20
CVE-2021-2078 [HIGH] CVE-2021-2078: Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Sup
Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacke
cvelistv5nvd
CVE-2020-14669HIGHCVSS 8.2v12.1v12.22020-07-15
CVE-2020-14669 [HIGH] CVE-2020-14669: Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Sup
Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attac
cvelistv5nvd
CVE-2020-2865MEDIUMCVSS 5.3v12.1v12.22020-04-15
CVE-2020-2865 [MEDIUM] CVE-2020-2865: Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: Installation). S
Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: Installation). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized read acce
cvelistv5nvd
CVE-2019-2567HIGHCVSS 7.5v12.1v12.22019-04-23
CVE-2019-2567 [HIGH] CVE-2019-2567: Vulnerability in the Oracle Configurator component of Oracle Supply Chain Products Suite (subcompone
Vulnerability in the Oracle Configurator component of Oracle Supply Chain Products Suite (subcomponent: Active Model Generation). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can res
cvelistv5nvd