Categories: CVE/vulnerability

Oracle Critical Patch Update Addresses 405 New Security Vulnerabilities – April 2020

Oracle released an emergency security update for another critical remote code execution vulnerability that can be exploited by the remote attacker to gain control over the system.

A pre-release announcement released by Oracle on Tuesday, April 14, 2020. The patch update addresses 405 new security vulnerabilities.

Here is the list of the products updated, Oracle recommends customers to apply a critical patch as soon as possible.

Here is the List of Affected products

9 new security vulnerabilities patched with Oracle Database Server. Out of them, 2 vulnerabilities can be exploited by a remote attacker without authentication.

The update covers 1 critical security vulnerability with Oracle Global Lifecycle Management, attackers can exploit the vulnerability by only having the user credentials.

1 vulnerability that exists with Oracle Secure Backup is patched, this vulnerability can be exploited by attackers remotely without authentication.

Oracle Communications Applications receive a high number of fixes, in total 39 security patches provided, out of the 35 can be exploited remotely without authentication.

Oracle Construction and Engineering receive patches for 12 security vulnerabilities, out of the 9 can be exploited remotely without authentication.

Among others Oracle E-Business Suite receives a high number of patches, in total, it has received 74 security patches, 71 of them can be exploited remotely.

Oracle Financial Services Applications receives 34 new security patches and the Oracle Fusion Middleware receives 56 new security patches.

The update covers 45 new security vulnerabilities with Oracle MySQL and the Oracle virtualization server patches for 19 security vulnerabilities.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

33 minutes ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

40 minutes ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

44 minutes ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

47 minutes ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

49 minutes ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

14 hours ago