📦 E Business Suite
by Oracle
🔍 What is E Business Suite?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This critical vulnerability in Oracle E-Business Suite's iSurvey Module allows unauthenticated attackers to remotely execute arbitrary code and completely compromise Oracle Scripting systems. Affected...
This vulnerability in Oracle Customer Care allows authenticated attackers with low privileges to perform unauthorized data manipulation and access via HTTP. It affects Oracle E-Business Suite versions...
This vulnerability in Oracle Project Foundation allows authenticated attackers with low privileges to manipulate or access sensitive data via HTTP requests. It affects Oracle E-Business Suite versions...
This vulnerability in Oracle Contract Lifecycle Management for Public Sector allows authenticated attackers with network access via HTTP to perform unauthorized data manipulation and access. Attackers...
This vulnerability in Oracle Financials (E-Business Suite) allows authenticated attackers with low privileges to perform unauthorized data manipulation and access sensitive information via HTTP. Affec...
This vulnerability in Oracle Work in Process allows authenticated attackers with network access to manipulate critical data or gain unauthorized access to sensitive information. It affects Oracle E-Bu...
This vulnerability in Oracle Cost Management allows authenticated attackers with network access to manipulate critical data or access sensitive information. It affects Oracle E-Business Suite versions...
This vulnerability in Oracle Incentive Compensation allows authenticated attackers with low privileges to perform unauthorized data manipulation and access sensitive information via HTTP requests. It ...
This vulnerability in Oracle Field Service allows authenticated attackers with low privileges to perform unauthorized data manipulation and access sensitive information via HTTP requests. It affects O...
This vulnerability in Oracle Site Hub allows authenticated attackers with low privileges to perform unauthorized data manipulation and access sensitive information via HTTP requests. It affects Oracle...
This vulnerability in Oracle Production Scheduling's Import Utility allows unauthenticated attackers with network access via HTTP to compromise data integrity. Attackers can create, delete, or modify ...
This vulnerability in Oracle Applications Framework allows authenticated attackers with low privileges to perform unauthorized data manipulation and limited data reading by tricking users into clickin...
This vulnerability in Oracle Applications Framework allows high-privileged attackers with network access via HTTP to compromise the framework when they can trick another user into interacting with mal...