First published: Wed Apr 20 2011(Updated: )
Unspecified vulnerability in Oracle JD Edwards EnterpriseOne Tools 8.9 GA through 8.98.4.1 and OneWorld Tools through 24.1.3 allows remote attackers to affect confidentiality, integrity, and availability, related to Enterprise Infrastructure SEC.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JD Edwards EnterpriseOne Tools | =8.9 | |
Oracle JD Edwards | =8.9-budle14 | |
Oracle JD Edwards | =8.9-bundle14 | |
Oracle JD Edwards | =8.9-bundle21 | |
Oracle JD Edwards | =8.9-bundle9 | |
Oracle JD Edwards | =8.9.18 | |
Oracle JD Edwards | =8.98.1.4 | |
Oracle JD Edwards | =8.98.2.1 | |
Oracle JD Edwards EnterpriseOne | =8.9 | |
Oracle EnterpriseOne Tools | <=24.1.3 | |
Oracle PeopleSoft and JD Edwards Product Suite | =8.9 | |
Oracle PeopleSoft and JD Edwards Product Suite | =8.9-bundle23 | |
Oracle PeopleSoft and JD Edwards Product Suite | =8.9-bundle37 | |
Oracle PeopleSoft and JD Edwards Product Suite | =8.9-bundle38 | |
Oracle PeopleSoft and JD Edwards Product Suite | =8.9-bundle41 | |
Oracle PeopleSoft and JD Edwards Product Suite | =8.9-gp_2010-e | |
Oracle PeopleSoft and JD Edwards Product Suite | =8.98.4.1 | |
Oracle PeopleSoft and JD Edwards Product Suite | =8.9-bundle37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0825 is regarded as a vulnerability that may significantly affect the confidentiality, integrity, and availability of affected systems.
To address CVE-2011-0825, users should upgrade to the latest version of Oracle JD Edwards EnterpriseOne Tools or apply any relevant patches provided by Oracle.
CVE-2011-0825 affects Oracle JD Edwards EnterpriseOne Tools versions from 8.9 GA up to 8.98.4.1, as well as the OneWorld Tools up to version 24.1.3.
CVE-2011-0825 impacts systems running Oracle JD Edwards EnterpriseOne, including various bundles and versions of the software.
While there is no specific information indicating active exploitation, the vulnerability poses risks, and it is advisable to remedy it as soon as possible.