{"vuid":"VU#150508","idnumber":"150508","name":"Oracle E-Business Suite Applications Technology Stack vulnerability","keywords":["Oracle E-Business Suite and Applications","Oracle Applications Technology Stack","APPS06","oracle_cpu_October_2005","Oracle CPU October 2005"],"overview":"An unspecified vulnerability in the Oracle Applications Technology Stack may allow a remote, unauthenticated attacker to compromise system confidentiality and integrity.","clean_desc":"Oracle Applications Technology Stack is a collection of Oracle products bundled with the Oracle E-Business Suite. There is an vulnerability in the Applications Technology Stack. The details of this vulnerability are not clear. However, Oracle states this issue can allow an attacker to easily compromise system confidentiality and integrity. This issue is identified as APPS06 in the Oracle Critical Patch Update for October 2005.","impact":"A remote, unauthenticated attacker may be able to may be able gain access to, and modify sensitive information.","resolution":"Apply updates \nApply the appropriate patch or upgrade as specified in the Oracle Critical Patch Update for October 2005.","workarounds":"","sysaffected":"","thanks":"This document is based on information contained in the \nOracle Critical Patch Update for October 2005","author":"This document was written by Jeff Gennari.","public":["http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html","http://secunia.com/advisories/17250/","http://www.red-database-security.com/advisory/details_oracle_cpu_october"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-10-19T14:12:22Z","publicdate":"2005-10-18T00:00:00Z","datefirstpublished":"2005-10-21T17:10:27Z","dateupdated":"2005-10-21T17:49:56Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"18","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"16.2","cam_scorecurrentwidelyknown":"23.2875","cam_scorecurrentwidelyknownexploited":"43.5375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":16.2,"vulnote":null}