📦 Configurator
by Oracle
🔍 What is Configurator?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This is a path traversal vulnerability (CWE-22) in Oracle Configurator within Oracle E-Business Suite that allows unauthenticated attackers to access sensitive data via HTTP. It affects Oracle E-Busin...
This vulnerability in Oracle Configurator (part of Oracle E-Business Suite) allows authenticated attackers with low privileges to perform unauthorized data manipulation and access sensitive informatio...
This vulnerability in Oracle Configurator allows unauthenticated attackers with network access via HTTP to read sensitive data from the application. It affects Oracle E-Business Suite versions 12.2.3 ...
This vulnerability in Oracle Configurator allows unauthenticated attackers with network access via HTTP to compromise the system. It requires human interaction (like clicking a link) and can lead to u...