📦 Istore
by Oracle
🔍 What is Istore?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Oracle iStore's Shopping Cart component allows authenticated attackers with low privileges to perform unauthorized data manipulation and access. It affects Oracle E-Business Suit...
This vulnerability in Oracle iStore allows unauthenticated attackers to access sensitive data and modify information via HTTP. It affects Oracle E-Business Suite versions 12.1.1-12.1.3 and 12.2.3-12.2...
This vulnerability in Oracle iStore allows unauthenticated attackers to access sensitive data and modify some data via HTTP requests. It affects Oracle E-Business Suite versions 12.1.1-12.1.3 and 12.2...
This vulnerability in Oracle iStore allows unauthenticated attackers to access sensitive data and modify information via HTTP requests. It affects Oracle E-Business Suite versions 12.1.1-12.1.3 and 12...
An unauthenticated attacker can exploit this vulnerability in Oracle iStore via HTTP to modify or read limited data, requiring interaction from another user. This affects Oracle E-Business Suite iStor...
This vulnerability allows unauthenticated attackers with network access via HTTP to read sensitive data from Oracle iStore, part of Oracle E-Business Suite. It affects Oracle iStore versions 12.2.3 th...