CVE-2008-7234

Unspecified vulnerability in the Oracle BPEL Worklist Application component in Oracle Application Server 10.1.2.2 and 10.1.3.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, aka AS03.
References
Link Resource
http://marc.info/?l=bugtraq&m=120058413923005&w=2 Issue Tracking Mailing List Patch Third Party Advisory
http://secunia.com/advisories/28518 Third Party Advisory
http://secunia.com/advisories/28556 Third Party Advisory
http://securitytracker.com/id?1019218 Patch Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html Broken Link
http://www.osvdb.org/40295 Broken Link
http://www.securityfocus.com/bid/27229 Exploit Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-017A.html Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/0150 Patch Third Party Advisory
http://www.vupen.com/english/advisories/2008/0180 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:application_server:10.1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.3.3:*:*:*:*:*:*:*

History

28 Jul 2021, 18:40

Type Values Removed Values Added
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html - Broken Link
References (OSVDB) http://www.osvdb.org/40295 - (OSVDB) http://www.osvdb.org/40295 - Broken Link
References (SECUNIA) http://secunia.com/advisories/28518 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/28518 - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=120058413923005&w=2 - Patch (HP) http://marc.info/?l=bugtraq&m=120058413923005&w=2 - Issue Tracking, Mailing List, Patch, Third Party Advisory
References (SECTRACK) http://securitytracker.com/id?1019218 - Patch (SECTRACK) http://securitytracker.com/id?1019218 - Patch, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/27229 - Exploit (BID) http://www.securityfocus.com/bid/27229 - Exploit, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/28556 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/28556 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2008/0150 - Patch, Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2008/0150 - Patch, Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2008/0180 - Patch, Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2008/0180 - Patch, Third Party Advisory
References (CERT) http://www.us-cert.gov/cas/techalerts/TA08-017A.html - Patch, US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA08-017A.html - Patch, Third Party Advisory, US Government Resource
CPE cpe:2.3:a:oracle:application_server_10g:10.1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server_10g:10.1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_server:10.1.2.2:*:*:*:*:*:*:*

Information

Published : 2009-09-14 14:30

Updated : 2023-12-10 10:51


NVD link : CVE-2008-7234

Mitre link : CVE-2008-7234

CVE.ORG link : CVE-2008-7234


JSON object : View

Products Affected

oracle

  • application_server