Description
Oracle E-Business Suite iStore allows registering a new user. Therefore, an attacker may interact with the system as an authenticated user.
Remediation
It's recommended to turn off user registration
References
Related Vulnerabilities
Jetty ConcatServlet Information Disclosure (CVE-2021-28169)
WordPress Plugin Clone Information Disclosure (2.4.2)
WordPress Plugin YITH Product Size Charts for WooCommerce Security Bypass (1.1.11)
Passive Mixed Content over HTTPS
WordPress Plugin WP Munich Blocks-Gutenberg Blocks for WordPress Security Bypass (0.7.2)