Oracle Banking Treasury Management, version 14.4 Oracle Banking Party Management, version 2.7.0 Oracle Banking Liquidity Management, versions 14.2, 14.3, 14.5 Oracle Banking Enterprise Default Management, versions 2.10.0, 2.12.0 Oracle Application Testing Suite, version 13.3.0.1 Oracle Application Express Application Builder (DOMPurify), versions prior to 21.1.0.0.1 ![]() Oracle Application Express (CKEditor), versions prior to 21.1.0.0.1 Oracle Application Express, versions prior to 21.1.0.0.4 Oracle Agile Engineering Data Management, version 6.2.1.0 Oracle Access Manager, version 11.1.2.3.0 MySQL Server, versions 5.7.34 and prior, 8.0.25 and prior MySQL Enterprise Monitor, versions 8.0.23 and prior MySQL Connectors, versions 8.0.23 and prior MICROS Kitchen Display System Hardware, version 210 MICROS Compact Workstation 3, version 310 JD Edwards EnterpriseOne Tools, versions 9.2.5.3 and prior JD Edwards EnterpriseOne Orchestrator, versions 9.2.5.3 and prior Oracle Construction and Engineering Suite Instantis EnterpriseTrack, versions 17.1, 17.2, 17.3 Hyperion Infrastructure Technology, versions 11.1.2.4, 11.2.5.0 Hyperion Financial Reporting, versions 11.1.2.4, 11.2.5.0 Hyperion Essbase Administration Services, versions 11.1.2.4, 21.2 Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.īig Data Spatial and Graph, versions prior to 2.0, prior to 23.1Įnterprise Manager Base Platform, version 13.4.0.0Įssbase Analytic Provider Services, versions 11.1.2.4, 21.2įujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers, versions prior to XCP2400, prior to XCP3100 The product area is shown in the Patch Availability Document column. Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at July 2021 Critical Patch Update: Executive Summary and Analysis. This Critical Patch Update contains 342 new security patches across the product families listed below. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay. ![]() In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. Oracle Critical Patch Update Advisory - July 2021 DescriptionĪ Critical Patch Update is a collection of patches for multiple security vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |