Friday, January 31, 2025
HomeCyber Security News297 Vulnerabilities Fixed with the Oracle Critical Patch Update

297 Vulnerabilities Fixed with the Oracle Critical Patch Update

Published on

SIEM as a Service

Follow Us on Google News

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes across multiple products.

Affected products including Enterprise Manager, Java SE, MySQL, JD Edwards, Oracle Supply Chain Products, Database, E-Business Suite, Retail Applications, Virtualization, Oracle Banking Platform and more.

Oracle said, Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory.

There is some earlier instance, the attacker has been exploited some of the vulnerabilities in Oracle products because targeted customers had failed to apply available Oracle patches.

All 284 are fixed and released the updates so now Oracle strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay.

Some of the vulnerabilities are potentially exploited to the system that allows an attacker to take over the complete control of the vulnerable system. so applying the patch as soon as possible will reduce the risk of successful attack by blocking network protocols required by an attack.

In this case, several vulnerabilities addressed in this Critical Patch Update affect multiple products and the CVE has been assigned for each vulnerability.

Here you can find the complete list of Affected Products and Patch Information.

According to Oracle, “Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit”

Also Read

Oracle Released Biggest Security Updates – 284 Vulnerabilities are Fixed that Affected Oracle Products

Oracle Released Security Update Addresses a Critical Database Vulnerability That Affects Multiple Versions

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...