
- #Resolved versions for ap 1.3.9 and test app 2.0.1 update
- #Resolved versions for ap 1.3.9 and test app 2.0.1 Patch
- #Resolved versions for ap 1.3.9 and test app 2.0.1 software
- #Resolved versions for ap 1.3.9 and test app 2.0.1 code
MySQL Enterprise Monitor, versions 8.0.21 and prior Management Pack for Oracle GoldenGate, version 12.2.1.2.0 Oracle Construction and Engineering Suite Instantis EnterpriseTrack, versions 17.1, 17.2, 17.3 Hyperion Lifecycle Management, version 11.1.2.4 Hyperion Infrastructure Technology, version 11.1.2.4 Hyperion Analytic Provider Services, version 11.1.2.4
#Resolved versions for ap 1.3.9 and test app 2.0.1 Patch
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.Īpplication Performance Management (APM), versions 13.3.0.0, 13.4.0.0īig Data Spatial and Graph, versions prior to 3.0Įnterprise Manager Base Platform, versions 13.2.1.0, 13.3.0.0, 13.4.0.0Įnterprise Manager for Peoplesoft, version 13.4.1.1Įnterprise Manager for Storage Management, versions 13.3.0.0, 13.4.0.0Įnterprise Manager Ops Center, version 12.4.0.0įujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers, versions prior to XCP2362, prior to XCP3090įujitsu M12-1, M12-2, M12-2S Servers, versions prior to XCP3090 The product area is shown in the Patch Availability Document column.
#Resolved versions for ap 1.3.9 and test app 2.0.1 update
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below.
#Resolved versions for ap 1.3.9 and test app 2.0.1 software
Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at October 2020 Critical Patch Update: Executive Summary and Analysis. This Critical Patch Update contains 403 new security patches across the product families listed below. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches.

The “traditional” advisory is published at. Oracle has published two versions of the October 2020 Critical Patch Update Advisory: this version of the advisory implemented the change in how non-exploitable vulnerabilities in third-party components are reported, and the “traditional” advisory follows the same format as the previous advisories. Starting with the October 2020 Critical Patch Update, Oracle lists updates that address vulnerabilities in third-party components which are not exploitable in the context of their inclusion in their respective Oracle product beneath the product's risk matrix. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory.

#Resolved versions for ap 1.3.9 and test app 2.0.1 code
These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products.

Oracle Critical Patch Update Advisory - October 2020 DescriptionĪ Critical Patch Update is a collection of patches for multiple security vulnerabilities.
