3832 lines
316 KiB
Text
3832 lines
316 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2021-45105</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: false,
|
||
nistV2Present: true,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2021-45105</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-45105&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-warning">5.9 MEDIUM</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>5.9 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 3.6 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 2.2 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> High </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> None </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> None </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss2CalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2021-45105&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST" class="label label-warning">4.3 MEDIUM</a></span></span>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss2-panel-vector"
|
||
class="tooltipCvss2NistMetrics">(AV:N/AC:M/Au:N/C:N/I:N/A:P)</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value="<span id ='cnaV2Metric' style='display:none'><strong style='font-size:1.2em' >CVSS v2.0 Severity and Metrics:</strong><p data-testid='vuln-cvssv2-score-container'><strong>Base Score: </strong><span data-testid='vuln-cvssv2-base-score'>4.3 </span><span data-testid='vuln-cvssv2-base-score-severity'>MEDIUM</span><br /><strong>Vector: </strong><span data-testid='vuln-cvssv2-vector'>(AV:N/AC:M/Au:N/C:N/I:N/A:P)</span><br /><strong>Impact Subscore: </strong><span data-testid='vuln-cvssv2-impact-subscore'>2.9</span><br /><strong>Exploitability Subscore: </strong><span data-testid='vuln-cvssv2-exploitability-score'>8.6</span></p><hr /><p data-testid='vuln-cvssv2-metrics-container'><strong>Access Vector (AV): </strong><span data-testid='vuln-cvssv2-av'>Network</span><br /><strong>Access Complexity (AC): </strong><span data-testid='vuln-cvssv2-ac'>Medium</span><br /><strong>Authentication (AU): </strong><span data-testid='vuln-cvssv2-au'>None</span><br /><strong>Confidentiality (C): </strong><span data-testid='vuln-cvssv3-c'>None</span><br /><strong>Integrity (I): </strong><span data-testid='vuln-cvssv2-i'>None</span><br /><strong>Availability (A): </strong><span data-testid='vuln-cvssv2-a'>Partial</span><br /><strong>Additional Information: </strong><br/><span data-testid='vuln-cvssv2-additional'>Allows disruption of service<br/></span></p></span>"/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/19/1"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/19/1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/19/1"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/19/1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-4">
|
||
<td data-testid="vuln-hyperlinks-link-4">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-4">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-5">
|
||
<td data-testid="vuln-hyperlinks-link-5">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-5">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-6">
|
||
<td data-testid="vuln-hyperlinks-link-6">
|
||
<a
|
||
href="https://logging.apache.org/log4j/2.x/security.html"
|
||
target="_blank" rel="noopener noreferrer">https://logging.apache.org/log4j/2.x/security.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-6">
|
||
<span>
|
||
<span class="badge">Release Notes</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-7">
|
||
<td data-testid="vuln-hyperlinks-link-7">
|
||
<a
|
||
href="https://logging.apache.org/log4j/2.x/security.html"
|
||
target="_blank" rel="noopener noreferrer">https://logging.apache.org/log4j/2.x/security.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-7">
|
||
<span>
|
||
<span class="badge">Release Notes</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-8">
|
||
<td data-testid="vuln-hyperlinks-link-8">
|
||
<a
|
||
href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
|
||
target="_blank" rel="noopener noreferrer">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-8">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-9">
|
||
<td data-testid="vuln-hyperlinks-link-9">
|
||
<a
|
||
href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
|
||
target="_blank" rel="noopener noreferrer">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-9">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-10">
|
||
<td data-testid="vuln-hyperlinks-link-10">
|
||
<a
|
||
href="https://security.netapp.com/advisory/ntap-20211218-0001/"
|
||
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20211218-0001/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-10">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-11">
|
||
<td data-testid="vuln-hyperlinks-link-11">
|
||
<a
|
||
href="https://security.netapp.com/advisory/ntap-20211218-0001/"
|
||
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20211218-0001/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-11">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-12">
|
||
<td data-testid="vuln-hyperlinks-link-12">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-12">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-13">
|
||
<td data-testid="vuln-hyperlinks-link-13">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-13">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-14">
|
||
<td data-testid="vuln-hyperlinks-link-14">
|
||
<a
|
||
href="https://www.debian.org/security/2021/dsa-5024"
|
||
target="_blank" rel="noopener noreferrer">https://www.debian.org/security/2021/dsa-5024</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-14">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-15">
|
||
<td data-testid="vuln-hyperlinks-link-15">
|
||
<a
|
||
href="https://www.debian.org/security/2021/dsa-5024"
|
||
target="_blank" rel="noopener noreferrer">https://www.debian.org/security/2021/dsa-5024</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-15">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-16">
|
||
<td data-testid="vuln-hyperlinks-link-16">
|
||
<a
|
||
href="https://www.kb.cert.org/vuls/id/930724"
|
||
target="_blank" rel="noopener noreferrer">https://www.kb.cert.org/vuls/id/930724</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-16">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-17">
|
||
<td data-testid="vuln-hyperlinks-link-17">
|
||
<a
|
||
href="https://www.kb.cert.org/vuls/id/930724"
|
||
target="_blank" rel="noopener noreferrer">https://www.kb.cert.org/vuls/id/930724</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-17">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-18">
|
||
<td data-testid="vuln-hyperlinks-link-18">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpuapr2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-18">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-19">
|
||
<td data-testid="vuln-hyperlinks-link-19">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpuapr2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-19">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-20">
|
||
<td data-testid="vuln-hyperlinks-link-20">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpujan2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpujan2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-20">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-21">
|
||
<td data-testid="vuln-hyperlinks-link-21">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpujan2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpujan2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-21">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-22">
|
||
<td data-testid="vuln-hyperlinks-link-22">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpujul2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpujul2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-22">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-23">
|
||
<td data-testid="vuln-hyperlinks-link-23">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpujul2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpujul2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-23">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-24">
|
||
<td data-testid="vuln-hyperlinks-link-24">
|
||
<a
|
||
href="https://www.zerodayinitiative.com/advisories/ZDI-21-1541/"
|
||
target="_blank" rel="noopener noreferrer">https://www.zerodayinitiative.com/advisories/ZDI-21-1541/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-24">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-25">
|
||
<td data-testid="vuln-hyperlinks-link-25">
|
||
<a
|
||
href="https://www.zerodayinitiative.com/advisories/ZDI-21-1541/"
|
||
target="_blank" rel="noopener noreferrer">https://www.zerodayinitiative.com/advisories/ZDI-21-1541/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-25">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noopener noreferrer">CWE-20</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Improper Input Validation</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-0-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Apache Software Foundation </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-CWEs-row-1">
|
||
<td data-testid="vuln-CWEs-link-1">
|
||
<a href="http://cwe.mitre.org/data/definitions/674.html" target="_blank" rel="noopener noreferrer">CWE-674</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-1">Uncontrolled Recursion</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-1">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-1-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-1-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Apache Software Foundation </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2021-45105"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":3,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0","id":"15444452","matchCpes":[],"rangeDescription":" versions from (including) 2.0 up to (excluding) 2.3.1 ","rangeStartType":"including","rangeStartVersion":"2.0","rangeEndType":"excluding","rangeEndVersion":"2.3.1","rangeId":"455972","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1","id":"15444453","matchCpes":[],"rangeDescription":" versions from (including) 2.4 up to (excluding) 2.12.3 ","rangeStartType":"including","rangeStartVersion":"2.4","rangeEndType":"excluding","rangeEndVersion":"2.12.3","rangeId":"455973","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2","id":"15444454","matchCpes":[],"rangeDescription":" versions from (including) 2.13.0 up to (including) 2.16.0 ","rangeStartType":"including","rangeStartVersion":"2.13.0","rangeEndType":"including","rangeEndVersion":"2.16.0","rangeId":"455974","rangeCpes":[]}],"containers":[]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Acloud_manager%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:netapp:cloud_manager:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0","id":"15444451","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":2,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:debian:debian_linux:10.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0","id":"15444449","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A11.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:debian:debian_linux:11.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1","id":"15444450","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":4,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asonicwall%3Aemail_security%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:sonicwall:email_security","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0","id":"15444447","matchCpes":[],"rangeDescription":" versions up to (including) 10.0.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"10.0.12","rangeId":"455956","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asonicwall%3Anetwork_security_manager%3A*%3A*%3A*%3A*%3Aon-premises%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:sonicwall:network_security_manager:*:*:*:*:on-premises:*:*:*","cpe22Uri":"cpe:/a:sonicwall:network_security_manager:::~~on-premises~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1","id":"15444446","matchCpes":[],"rangeDescription":" versions from (including) 2.0 up to (excluding) 3.0 ","rangeStartType":"including","rangeStartVersion":"2.0","rangeEndType":"excluding","rangeEndVersion":"3.0","rangeId":"455955","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asonicwall%3Anetwork_security_manager%3A*%3A*%3A*%3A*%3Asaas%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:sonicwall:network_security_manager:*:*:*:*:saas:*:*:*","cpe22Uri":"cpe:/a:sonicwall:network_security_manager:::~~saas~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-2","id":"15444445","matchCpes":[],"rangeDescription":" versions from (including) 2.0 up to (excluding) 3.0 ","rangeStartType":"including","rangeStartVersion":"2.0","rangeEndType":"excluding","rangeEndVersion":"3.0","rangeId":"455954","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asonicwall%3Aweb_application_firewall%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:sonicwall:web_application_firewall:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:sonicwall:web_application_firewall","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-3","id":"15444448","matchCpes":[],"rangeDescription":" versions from (including) 3.0.0 up to (excluding) 3.1.0 ","rangeStartType":"including","rangeStartVersion":"3.0.0","rangeEndType":"excluding","rangeEndVersion":"3.1.0","rangeId":"455957","rangeCpes":[]}],"containers":[]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asonicwall%3A6bk1602-0aa12-0tp0%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sonicwall:6bk1602-0aa12-0tp0:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sonicwall:6bk1602-0aa12-0tp0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"15444443","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asonicwall%3A6bk1602-0aa12-0tp0_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sonicwall:6bk1602-0aa12-0tp0_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sonicwall:6bk1602-0aa12-0tp0_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"15444444","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.7.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.7.0","rangeId":"455959","rangeCpes":[]}],"containers":[]}]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asonicwall%3A6bk1602-0aa22-0tp0%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sonicwall:6bk1602-0aa22-0tp0:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sonicwall:6bk1602-0aa22-0tp0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-0","id":"15444441","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asonicwall%3A6bk1602-0aa22-0tp0_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sonicwall:6bk1602-0aa22-0tp0_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sonicwall:6bk1602-0aa22-0tp0_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1-0","id":"15444442","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.7.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.7.0","rangeId":"455961","rangeCpes":[]}],"containers":[]}]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asonicwall%3A6bk1602-0aa32-0tp0%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sonicwall:6bk1602-0aa32-0tp0:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sonicwall:6bk1602-0aa32-0tp0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0-0","id":"15444439","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asonicwall%3A6bk1602-0aa32-0tp0_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sonicwall:6bk1602-0aa32-0tp0_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sonicwall:6bk1602-0aa32-0tp0_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-1-0","id":"15444440","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.7.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.7.0","rangeId":"455963","rangeCpes":[]}],"containers":[]}]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asonicwall%3A6bk1602-0aa42-0tp0%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sonicwall:6bk1602-0aa42-0tp0:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sonicwall:6bk1602-0aa42-0tp0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0-0","id":"15444437","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asonicwall%3A6bk1602-0aa42-0tp0_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sonicwall:6bk1602-0aa42-0tp0_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sonicwall:6bk1602-0aa42-0tp0_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1-0","id":"15444438","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.7.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.7.0","rangeId":"455965","rangeCpes":[]}],"containers":[]}]}]},{"id":9,"dataTestId":"vuln-software-config-9","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-9-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asonicwall%3A6bk1602-0aa52-0tp0%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sonicwall:6bk1602-0aa52-0tp0:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sonicwall:6bk1602-0aa52-0tp0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-0-0","id":"15444435","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asonicwall%3A6bk1602-0aa52-0tp0_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sonicwall:6bk1602-0aa52-0tp0_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sonicwall:6bk1602-0aa52-0tp0_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-1-0","id":"15444436","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.7.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.7.0","rangeId":"455967","rangeCpes":[]}],"containers":[]}]}]},{"id":10,"dataTestId":"vuln-software-config-10","totalCpeCount":193,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-10-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aagile_engineering_data_management%3A6.2.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:agile_engineering_data_management:6.2.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0","id":"15444283","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aagile_plm%3A9.3.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:agile_plm:9.3.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1","id":"15444261","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aagile_plm_mcad_connector%3A3.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:agile_plm_mcad_connector:3.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:agile_plm_mcad_connector:3.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-2","id":"15444369","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aautovue_for_agile_product_lifecycle_management%3A21.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-3","id":"15444306","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_deposits_and_lines_of_credit_servicing%3A2.12.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_deposits_and_lines_of_credit_servicing:2.12.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_deposits_and_lines_of_credit_servicing:2.12.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-4","id":"15444371","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_enterprise_default_management%3A2.7.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_enterprise_default_management:2.7.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_enterprise_default_management:2.7.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-5","id":"15444370","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_enterprise_default_management%3A2.12.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_enterprise_default_management:2.12.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-6","id":"15444308","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_loans_servicing%3A2.12.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_loans_servicing:2.12.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_loans_servicing:2.12.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-7","id":"15444354","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_party_management%3A2.7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_party_management:2.7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_party_management:2.7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-8","id":"15444309","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_payments%3A14.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_payments:14.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_payments:14.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-9","id":"15444389","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_platform%3A2.6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_platform:2.6.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-10","id":"15444252","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_platform%3A2.7.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_platform:2.7.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-11","id":"15444281","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_platform%3A2.12.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_platform:2.12.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_platform:2.12.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-12","id":"15444305","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_trade_finance%3A14.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_trade_finance:14.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_trade_finance:14.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-13","id":"15444390","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abanking_treasury_management%3A14.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:banking_treasury_management:14.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:banking_treasury_management:14.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-14","id":"15444391","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Abusiness_intelligence%3A5.5.0.0.0%3A*%3A*%3A*%3Aenterprise%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*","cpe22Uri":"cpe:/a:oracle:business_intelligence:5.5.0.0.0::~~enterprise~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-15","id":"15444265","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_asap%3A7.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_asap:7.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-16","id":"15444322","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_billing_and_revenue_management%3A12.0.0.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_billing_and_revenue_management:12.0.0.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-17","id":"15444359","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_billing_and_revenue_management%3A12.0.0.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_billing_and_revenue_management:12.0.0.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-18","id":"15444395","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_console%3A1.9.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_console:1.9.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-19","id":"15444381","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_network_function_cloud_native_environment%3A1.10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-20","id":"15444386","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_network_repository_function%3A1.15.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_network_repository_function:1.15.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-21","id":"15444385","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_network_repository_function%3A1.15.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_network_repository_function:1.15.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-22","id":"15444388","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_network_slice_selection_function%3A1.8.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-23","id":"15444384","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_policy%3A1.15.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_policy:1.15.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-24","id":"15444382","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_security_edge_protection_proxy%3A1.7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-25","id":"15444307","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_service_communication_proxy%3A1.15.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-26","id":"15444387","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_cloud_native_core_unified_data_repository%3A1.15.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-27","id":"15444383","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_convergence%3A3.0.2.2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_convergence:3.0.2.2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_convergence:3.0.2.2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-28","id":"15444326","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_convergence%3A3.0.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_convergence:3.0.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-29","id":"15444410","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_convergent_charging_controller%3A6.0.1.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_convergent_charging_controller:6.0.1.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-30","id":"15444357","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_convergent_charging_controller%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_convergent_charging_controller","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-31","id":"15444358","matchCpes":[],"rangeDescription":" versions from (including) 12.0.1.0.0 up to (including) 12.0.4.0.0 ","rangeStartType":"including","rangeStartVersion":"12.0.1.0.0","rangeEndType":"including","rangeEndVersion":"12.0.4.0.0","rangeId":"464881","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_diameter_signaling_router%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_diameter_signaling_router","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-32","id":"15444349","matchCpes":[],"rangeDescription":" versions from (including) 8.3.0.0 up to (including) 8.5.1.0 ","rangeStartType":"including","rangeStartVersion":"8.3.0.0","rangeEndType":"including","rangeEndVersion":"8.5.1.0","rangeId":"463335","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_eagle_element_management_system%3A46.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_eagle_element_management_system:46.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-33","id":"15444413","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_eagle_ftp_table_base_retrieval%3A4.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_eagle_ftp_table_base_retrieval:4.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-34","id":"15444319","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_element_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_element_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-35","id":"15444374","matchCpes":[],"rangeDescription":" versions up to (excluding) 9.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"9.0","rangeId":"486124","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_evolved_communications_application_server%3A7.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_evolved_communications_application_server:7.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-36","id":"15444282","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_interactive_session_recorder%3A6.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_interactive_session_recorder:6.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-37","id":"15444290","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_interactive_session_recorder%3A6.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_interactive_session_recorder:6.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-38","id":"15444291","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_ip_service_activator%3A7.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_ip_service_activator:7.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-39","id":"15444272","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_messaging_server%3A8.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_messaging_server:8.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-40","id":"15444310","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_network_charging_and_control%3A6.0.1.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_network_charging_and_control:6.0.1.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-41","id":"15444356","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_network_charging_and_control%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_network_charging_and_control","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-42","id":"15444355","matchCpes":[],"rangeDescription":" versions from (including) 12.0.1.0.0 up to (including) 12.0.4.0.0 ","rangeStartType":"including","rangeStartVersion":"12.0.1.0.0","rangeEndType":"including","rangeEndVersion":"12.0.4.0.0","rangeId":"464867","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_network_integrity%3A7.3.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_network_integrity:7.3.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-43","id":"15444288","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_performance_intelligence_center%3A10.4.0.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_performance_intelligence_center:10.4.0.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_performance_intelligence_center:10.4.0.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-44","id":"15444298","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_pricing_design_center%3A12.0.0.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_pricing_design_center:12.0.0.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-45","id":"15444372","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_pricing_design_center%3A12.0.0.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_pricing_design_center:12.0.0.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-46","id":"15444373","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_service_broker%3A6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_service_broker:6.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_service_broker:6.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-47","id":"15444352","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_services_gatekeeper%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_services_gatekeeper:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-48","id":"15444279","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_session_report_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_session_report_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-49","id":"15444375","matchCpes":[],"rangeDescription":" versions up to (excluding) 9.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"9.0","rangeId":"486126","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_session_route_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_session_route_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-50","id":"15444376","matchCpes":[],"rangeDescription":" versions up to (excluding) 9.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"9.0","rangeId":"486129","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_unified_inventory_management%3A7.3.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_unified_inventory_management:7.3.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-51","id":"15444262","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_unified_inventory_management%3A7.4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_unified_inventory_management:7.4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-52","id":"15444293","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_unified_inventory_management%3A7.4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_unified_inventory_management:7.4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-53","id":"15444353","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_user_data_repository%3A12.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_user_data_repository:12.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-54","id":"15444412","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_webrtc_session_controller%3A7.2.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_webrtc_session_controller:7.2.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-55","id":"15444350","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Acommunications_webrtc_session_controller%3A7.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:communications_webrtc_session_controller:7.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-56","id":"15444351","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Adata_integrator%3A12.2.1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:data_integrator:12.2.1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-57","id":"15444256","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Adata_integrator%3A12.2.1.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:data_integrator:12.2.1.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-58","id":"15444284","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ae-business_suite%3A12.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:e-business_suite:12.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:e-business_suite:12.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-59","id":"15444242","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aenterprise_manager_base_platform%3A13.4.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:enterprise_manager_base_platform:13.4.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-60","id":"15444271","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aenterprise_manager_base_platform%3A13.5.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:enterprise_manager_base_platform:13.5.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-61","id":"15444303","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aenterprise_manager_for_peoplesoft%3A13.4.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:enterprise_manager_for_peoplesoft:13.4.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:enterprise_manager_for_peoplesoft:13.4.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-62","id":"15444278","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aenterprise_manager_for_peoplesoft%3A13.5.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:enterprise_manager_for_peoplesoft:13.5.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:enterprise_manager_for_peoplesoft:13.5.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-63","id":"15444418","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aenterprise_manager_ops_center%3A12.4.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:enterprise_manager_ops_center:12.4.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-64","id":"15444276","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Afinancial_services_analytical_applications_infrastructure%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:financial_services_analytical_applications_infrastructure","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-65","id":"15444325","matchCpes":[],"rangeDescription":" versions from (including) 8.0.7 up to (including) 8.1.1 ","rangeStartType":"including","rangeStartVersion":"8.0.7","rangeEndType":"including","rangeEndVersion":"8.1.1","rangeId":"458260","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Afinancial_services_model_management_and_governance%3A8.0.8.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.0.8.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:financial_services_model_management_and_governance:8.0.8.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-66","id":"15444324","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Afinancial_services_model_management_and_governance%3A8.1.0.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.0.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:financial_services_model_management_and_governance:8.1.0.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-67","id":"15444323","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Afinancial_services_model_management_and_governance%3A8.1.1.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.1.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:financial_services_model_management_and_governance:8.1.1.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-68","id":"15444342","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aflexcube_universal_banking%3A11.83.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:flexcube_universal_banking:11.83.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:flexcube_universal_banking:11.83.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-69","id":"15444416","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aflexcube_universal_banking%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:flexcube_universal_banking","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-70","id":"15444417","matchCpes":[],"rangeDescription":" versions from (including) 12.1.0 up to (including) 12.4 ","rangeStartType":"including","rangeStartVersion":"12.1.0","rangeEndType":"including","rangeEndVersion":"12.4","rangeId":"501631","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aflexcube_universal_banking%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:flexcube_universal_banking","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-71","id":"15444264","matchCpes":[],"rangeDescription":" versions from (including) 14.0.0 up to (including) 14.3.0 ","rangeStartType":"including","rangeStartVersion":"14.0.0","rangeEndType":"including","rangeEndVersion":"14.3.0","rangeId":"324522","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aflexcube_universal_banking%3A14.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:flexcube_universal_banking:14.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:flexcube_universal_banking:14.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-72","id":"15444392","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealth_sciences_empirica_signal%3A9.1.0.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:health_sciences_empirica_signal:9.1.0.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:health_sciences_empirica_signal:9.1.0.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-73","id":"15444426","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealth_sciences_empirica_signal%3A9.2.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:health_sciences_empirica_signal:9.2.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:health_sciences_empirica_signal:9.2.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-74","id":"15444425","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealth_sciences_inform%3A6.2.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:health_sciences_inform:6.2.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:health_sciences_inform:6.2.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-75","id":"15444424","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealth_sciences_inform%3A6.3.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:health_sciences_inform:6.3.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:health_sciences_inform:6.3.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-76","id":"15444422","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealth_sciences_inform%3A7.0.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:health_sciences_inform:7.0.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:health_sciences_inform:7.0.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-77","id":"15444423","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealth_sciences_information_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:health_sciences_information_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:health_sciences_information_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-78","id":"15444397","matchCpes":[],"rangeDescription":" versions from (including) 3.0.1 up to (including) 3.0.4 ","rangeStartType":"including","rangeStartVersion":"3.0.1","rangeEndType":"including","rangeEndVersion":"3.0.4","rangeId":"497401","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealthcare_data_repository%3A8.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:healthcare_data_repository:8.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:healthcare_data_repository:8.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-79","id":"15444360","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealthcare_foundation%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:healthcare_foundation:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:healthcare_foundation","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-80","id":"15444421","matchCpes":[],"rangeDescription":" versions from (including) 7.3.0.1 up to (including) 7.3.0.4 ","rangeStartType":"including","rangeStartVersion":"7.3.0.1","rangeEndType":"including","rangeEndVersion":"7.3.0.4","rangeId":"501635","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealthcare_master_person_index%3A5.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:healthcare_master_person_index:5.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:healthcare_master_person_index:5.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-81","id":"15444420","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealthcare_translational_research%3A4.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:healthcare_translational_research:4.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:healthcare_translational_research:4.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-82","id":"15444361","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahealthcare_translational_research%3A4.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:healthcare_translational_research:4.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:healthcare_translational_research:4.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-83","id":"15444419","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahospitality_suite8%3A8.13.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hospitality_suite8:8.13.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hospitality_suite8:8.13.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-84","id":"15444367","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahospitality_suite8%3A8.14.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hospitality_suite8:8.14.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hospitality_suite8:8.14.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-85","id":"15444368","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahospitality_token_proxy_service%3A19.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hospitality_token_proxy_service:19.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hospitality_token_proxy_service:19.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-86","id":"15444396","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahyperion_bi%5C%2B%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hyperion_bi\\+:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hyperion_bi%2b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-87","id":"15444432","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.2.8.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.2.8.0","rangeId":"501646","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahyperion_data_relationship_management%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hyperion_data_relationship_management","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-88","id":"15444378","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.2.8.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.2.8.0","rangeId":"486134","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahyperion_infrastructure_technology%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hyperion_infrastructure_technology","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-89","id":"15444380","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.2.8.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.2.8.0","rangeId":"486137","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahyperion_planning%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hyperion_planning:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hyperion_planning","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-90","id":"15444431","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.2.8.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.2.8.0","rangeId":"501645","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahyperion_profitability_and_cost_management%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hyperion_profitability_and_cost_management:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hyperion_profitability_and_cost_management","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-91","id":"15444430","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.2.8.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.2.8.0","rangeId":"501644","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahyperion_tax_provision%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:hyperion_tax_provision:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:hyperion_tax_provision","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-92","id":"15444429","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.2.8.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.2.8.0","rangeId":"501643","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aidentity_management_suite%3A12.2.1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:identity_management_suite:12.2.1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-93","id":"15444254","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aidentity_management_suite%3A12.2.1.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:identity_management_suite:12.2.1.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-94","id":"15444377","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aidentity_manager_connector%3A9.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:identity_manager_connector:9.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:identity_manager_connector:9.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-95","id":"15444415","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ainstantis_enterprisetrack%3A17.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:instantis_enterprisetrack:17.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-96","id":"15444258","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ainstantis_enterprisetrack%3A17.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:instantis_enterprisetrack:17.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-97","id":"15444259","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ainstantis_enterprisetrack%3A17.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:instantis_enterprisetrack:17.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-98","id":"15444260","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ainsurance_data_gateway%3A1.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:insurance_data_gateway:1.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:insurance_data_gateway:1.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-99","id":"15444428","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ainsurance_insbridge_rating_and_underwriting%3A5.2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:insurance_insbridge_rating_and_underwriting:5.2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-100","id":"15444366","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ainsurance_insbridge_rating_and_underwriting%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:insurance_insbridge_rating_and_underwriting","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-101","id":"15444427","matchCpes":[],"rangeDescription":" versions from (including) 5.4 up to (including) 5.6.0.0 ","rangeStartType":"including","rangeStartVersion":"5.4","rangeEndType":"including","rangeEndVersion":"5.6.0.0","rangeId":"501641","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ainsurance_insbridge_rating_and_underwriting%3A5.6.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:insurance_insbridge_rating_and_underwriting:5.6.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-102","id":"15444275","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ajdeveloper%3A12.2.1.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:jdeveloper:12.2.1.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-103","id":"15444277","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Amanaged_file_transfer%3A12.2.1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:managed_file_transfer:12.2.1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:managed_file_transfer:12.2.1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-104","id":"15444247","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Amanaged_file_transfer%3A12.2.1.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:managed_file_transfer:12.2.1.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-105","id":"15444287","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Amanagement_cloud_engine%3A1.5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:management_cloud_engine:1.5.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:management_cloud_engine:1.5.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-106","id":"15444414","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Amysql_enterprise_monitor%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:mysql_enterprise_monitor","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-107","id":"15444379","matchCpes":[],"rangeDescription":" versions up to (including) 8.0.29 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"8.0.29","rangeId":"486136","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Apayment_interface%3A19.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:payment_interface:19.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:payment_interface:19.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-108","id":"15444399","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Apayment_interface%3A20.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:payment_interface:20.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:payment_interface:20.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-109","id":"15444398","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Apeoplesoft_enterprise_peopletools%3A8.58%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.58","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-110","id":"15444266","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Apeoplesoft_enterprise_peopletools%3A8.59%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.59","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-111","id":"15444292","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_gateway%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_gateway","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-112","id":"15444296","matchCpes":[],"rangeDescription":" versions from (including) 17.12.0 up to (including) 17.12.11 ","rangeStartType":"including","rangeStartVersion":"17.12.0","rangeEndType":"including","rangeEndVersion":"17.12.11","rangeId":"426101","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_gateway%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_gateway","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-113","id":"15444348","matchCpes":[],"rangeDescription":" versions from (including) 18.8.0 up to (including) 18.8.13 ","rangeStartType":"including","rangeStartVersion":"18.8.0","rangeEndType":"including","rangeEndVersion":"18.8.13","rangeId":"463334","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_gateway%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_gateway","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-114","id":"15444347","matchCpes":[],"rangeDescription":" versions from (including) 19.12.0 up to (including) 19.12.12 ","rangeStartType":"including","rangeStartVersion":"19.12.0","rangeEndType":"including","rangeEndVersion":"19.12.12","rangeId":"463333","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_gateway%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_gateway","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-115","id":"15444304","matchCpes":[],"rangeDescription":" versions from (including) 20.12.0 up to (including) 20.12.7 ","rangeStartType":"including","rangeStartVersion":"20.12.0","rangeEndType":"including","rangeEndVersion":"20.12.7","rangeId":"435048","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_gateway%3A21.12.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_gateway:21.12.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_gateway:21.12.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-116","id":"15444346","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_p6_enterprise_project_portfolio_management%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_p6_enterprise_project_portfolio_management","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-117","id":"15444345","matchCpes":[],"rangeDescription":" versions from (including) 19.12.0.0 up to (including) 19.12.18.0 ","rangeStartType":"including","rangeStartVersion":"19.12.0.0","rangeEndType":"including","rangeEndVersion":"19.12.18.0","rangeId":"463331","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_p6_enterprise_project_portfolio_management%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_p6_enterprise_project_portfolio_management","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-118","id":"15444344","matchCpes":[],"rangeDescription":" versions from (including) 20.12.0.0 up to (including) 20.12.12.0 ","rangeStartType":"including","rangeStartVersion":"20.12.0.0","rangeEndType":"including","rangeEndVersion":"20.12.12.0","rangeId":"463330","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_p6_enterprise_project_portfolio_management%3A21.12.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:21.12.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_p6_enterprise_project_portfolio_management:21.12.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-119","id":"15444343","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_unifier%3A18.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_unifier:18.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-120","id":"15444253","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_unifier%3A19.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_unifier:19.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-121","id":"15444267","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_unifier%3A20.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_unifier:20.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-122","id":"15444286","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aprimavera_unifier%3A21.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:primavera_unifier:21.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-123","id":"15444327","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_back_office%3A14.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_back_office:14.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-124","id":"15444243","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_central_office%3A14.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_central_office:14.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-125","id":"15444251","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_customer_insights%3A15.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_customer_insights:15.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_customer_insights:15.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-126","id":"15444393","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_customer_insights%3A16.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_customer_insights:16.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_customer_insights:16.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-127","id":"15444394","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_data_extractor_for_merchandising%3A15.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_data_extractor_for_merchandising:15.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_data_extractor_for_merchandising:15.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-128","id":"15444402","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_data_extractor_for_merchandising%3A16.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_data_extractor_for_merchandising:16.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_data_extractor_for_merchandising:16.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-129","id":"15444401","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_eftlink%3A16.0.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_eftlink:16.0.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_eftlink:16.0.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-130","id":"15444315","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_eftlink%3A17.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_eftlink:17.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_eftlink:17.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-131","id":"15444316","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_eftlink%3A18.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_eftlink:18.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_eftlink:18.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-132","id":"15444317","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_eftlink%3A19.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_eftlink:19.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_eftlink:19.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-133","id":"15444318","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_eftlink%3A20.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_eftlink:20.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_eftlink:20.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-134","id":"15444341","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_eftlink%3A21.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_eftlink:21.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_eftlink:21.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-135","id":"15444400","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_financial_integration%3A14.1.3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_financial_integration:14.1.3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-136","id":"15444314","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_financial_integration%3A15.0.3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_financial_integration:15.0.3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-137","id":"15444321","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_financial_integration%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_financial_integration:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_financial_integration","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-138","id":"15444433","matchCpes":[],"rangeDescription":" versions from (including) 16.0.1 up to (including) 16.0.3 ","rangeStartType":"including","rangeStartVersion":"16.0.1","rangeEndType":"including","rangeEndVersion":"16.0.3","rangeId":"501647","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_financial_integration%3A19.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_financial_integration:19.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_financial_integration:19.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-139","id":"15444403","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_financial_integration%3A19.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_financial_integration:19.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-140","id":"15444365","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_integration_bus%3A14.1.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_integration_bus:14.1.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_integration_bus:14.1.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-141","id":"15444249","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_integration_bus%3A14.1.3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_integration_bus:14.1.3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-142","id":"15444313","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_integration_bus%3A15.0.3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_integration_bus:15.0.3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-143","id":"15444320","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_integration_bus%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_integration_bus:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_integration_bus","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-144","id":"15444339","matchCpes":[],"rangeDescription":" versions from (including) 16.0.1 up to (including) 16.0.3 ","rangeStartType":"including","rangeStartVersion":"16.0.1","rangeEndType":"including","rangeEndVersion":"16.0.3","rangeId":"463325","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_integration_bus%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_integration_bus:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_integration_bus","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-145","id":"15444340","matchCpes":[],"rangeDescription":" versions from (including) 19.0.0 up to (including) 19.0.1.0 ","rangeStartType":"including","rangeStartVersion":"19.0.0","rangeEndType":"including","rangeEndVersion":"19.0.1.0","rangeId":"463326","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_integration_bus%3A19.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_integration_bus:19.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_integration_bus:19.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-146","id":"15444363","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_integration_bus%3A19.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_integration_bus:19.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-147","id":"15444364","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_invoice_matching%3A15.0.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_invoice_matching:15.0.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_invoice_matching:15.0.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-148","id":"15444337","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_invoice_matching%3A16.0.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_invoice_matching:16.0.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_invoice_matching:16.0.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-149","id":"15444338","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_merchandising_system%3A16.0.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_merchandising_system:16.0.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-150","id":"15444280","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_merchandising_system%3A19.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_merchandising_system:19.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-151","id":"15444312","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_order_broker%3A16.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_order_broker:16.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-152","id":"15444248","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_order_broker%3A18.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_order_broker:18.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_order_broker:18.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-153","id":"15444289","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_order_broker%3A19.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_order_broker:19.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_order_broker:19.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-154","id":"15444302","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_order_management_system%3A19.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_order_management_system:19.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_order_management_system:19.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-155","id":"15444336","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_point-of-service%3A14.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_point-of-service:14.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-156","id":"15444255","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_predictive_application_server%3A14.1.3.46%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3.46:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_predictive_application_server:14.1.3.46","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-157","id":"15444333","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_predictive_application_server%3A15.0.3.115%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3.115:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_predictive_application_server:15.0.3.115","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-158","id":"15444334","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_predictive_application_server%3A16.0.3.240%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.240:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_predictive_application_server:16.0.3.240","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-159","id":"15444335","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_price_management%3A13.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_price_management:13.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_price_management:13.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-160","id":"15444331","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_price_management%3A14.0.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_price_management:14.0.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_price_management:14.0.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-161","id":"15444332","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_price_management%3A14.1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_price_management:14.1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_price_management:14.1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-162","id":"15444299","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_price_management%3A15.0.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_price_management:15.0.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_price_management:15.0.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-163","id":"15444300","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_price_management%3A16.0.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_price_management:16.0.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_price_management:16.0.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-164","id":"15444301","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_returns_management%3A14.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_returns_management:14.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-165","id":"15444250","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_service_backbone%3A14.1.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_service_backbone:14.1.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_service_backbone:14.1.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-166","id":"15444285","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_service_backbone%3A14.1.3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_service_backbone:14.1.3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-167","id":"15444295","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_service_backbone%3A15.0.3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_service_backbone:15.0.3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-168","id":"15444294","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_service_backbone%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_service_backbone:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_service_backbone","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-169","id":"15444330","matchCpes":[],"rangeDescription":" versions from (including) 16.0.1 up to (including) 16.0.3 ","rangeStartType":"including","rangeStartVersion":"16.0.1","rangeEndType":"including","rangeEndVersion":"16.0.3","rangeId":"463316","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_service_backbone%3A19.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_service_backbone:19.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_service_backbone:19.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-170","id":"15444329","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_service_backbone%3A19.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_service_backbone:19.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_service_backbone:19.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-171","id":"15444362","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_service_backbone%3A19.0.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_service_backbone:19.0.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_service_backbone:19.0.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-172","id":"15444311","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_store_inventory_management%3A14.0.4.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_store_inventory_management:14.0.4.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_store_inventory_management:14.0.4.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-173","id":"15444409","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_store_inventory_management%3A14.1.3.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_store_inventory_management:14.1.3.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_store_inventory_management:14.1.3.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-174","id":"15444404","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_store_inventory_management%3A14.1.3.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_store_inventory_management:14.1.3.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_store_inventory_management:14.1.3.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-175","id":"15444405","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_store_inventory_management%3A15.0.3.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_store_inventory_management:15.0.3.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_store_inventory_management:15.0.3.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-176","id":"15444406","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_store_inventory_management%3A15.0.3.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_store_inventory_management:15.0.3.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_store_inventory_management:15.0.3.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-177","id":"15444407","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aretail_store_inventory_management%3A16.0.3.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:retail_store_inventory_management:16.0.3.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:retail_store_inventory_management:16.0.3.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-178","id":"15444408","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Asiebel_ui_framework%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:siebel_ui_framework","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-179","id":"15444328","matchCpes":[],"rangeDescription":" versions up to (including) 21.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"21.12","rangeId":"463314","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Asql_developer%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:sql_developer","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-180","id":"15444411","matchCpes":[],"rangeDescription":" versions up to (excluding) 21.4.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"21.4.2","rangeId":"501625","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ataleo_platform%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:taleo_platform:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:taleo_platform","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-181","id":"15444434","matchCpes":[],"rangeDescription":" versions up to (excluding) 22.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"22.1","rangeId":"501648","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Autilities_framework%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:utilities_framework","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-182","id":"15444273","matchCpes":[],"rangeDescription":" versions from (including) 4.3.0.1.0 up to (including) 4.3.0.6.0 ","rangeStartType":"including","rangeStartVersion":"4.3.0.1.0","rangeEndType":"including","rangeEndVersion":"4.3.0.6.0","rangeId":"385052","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Autilities_framework%3A4.4.0.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:utilities_framework:4.4.0.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-183","id":"15444257","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Autilities_framework%3A4.4.0.2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:utilities_framework:4.4.0.2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-184","id":"15444274","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Autilities_framework%3A4.4.0.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:utilities_framework:4.4.0.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-185","id":"15444297","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Awebcenter_portal%3A12.2.1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:webcenter_portal:12.2.1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-186","id":"15444245","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Awebcenter_portal%3A12.2.1.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:webcenter_portal:12.2.1.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-187","id":"15444269","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Awebcenter_sites%3A12.2.1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:webcenter_sites:12.2.1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-188","id":"15444246","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Awebcenter_sites%3A12.2.1.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:webcenter_sites:12.2.1.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-189","id":"15444268","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aweblogic_server%3A12.2.1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:weblogic_server:12.2.1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-190","id":"15444244","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aweblogic_server%3A12.2.1.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:weblogic_server:12.2.1.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-191","id":"15444263","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Aweblogic_server%3A14.1.1.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:weblogic_server:14.1.1.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-192","id":"15444270","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 20 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/21/2024 1:31:58 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/19/1</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211218-0001/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5024</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujul2022.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.zerodayinitiative.com/advisories/ZDI-21-1541/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-1">5/14/2024 5:40:22 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-2">10/06/2022 1:31:39 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
>Record truncated, showing 500 of 5562 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-45105/change-record?changeRecordedOn=10/06/2022T13:31:39.727-0400">View Entire Change Record</a><br/>
|
||
<pre>OR
|
||
*cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*
|
||
*cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* versions from (including) 8.3.0.0 up to (including) 8.5.1.0
|
||
*cpe:2.3:a:oracle:communications_interactive_session_recorder:6.3:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:communications_service_broker:6.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:communications_</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
|
||
>Record truncated, showing 500 of 15857 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-45105/change-record?changeRecordedOn=10/06/2022T13:31:39.727-0400">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:agile_plm_mcad_connector:3.6:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:banking_deposits_and_lines_of_credit_servicing:2.12.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:banking_enterprise_default_management:2.7.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:banking_enter</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujul2022.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujul2022.html Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-3">7/25/2022 2:18:25 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Reference</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujul2022.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-4">4/19/2022 8:16:33 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-5">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-5">2/18/2022 11:42:47 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
|
||
>Record truncated, showing 500 of 5562 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-45105/change-record?changeRecordedOn=02/18/2022T23:42:47.970-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*
|
||
*cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* versions from (including) 8.3.0.0 up to (including) 8.5.1.0
|
||
*cpe:2.3:a:oracle:communications_interactive_session_recorder:6.3:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:communications_service_broker:6.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:communications_</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-6">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-6">2/07/2022 11:16:37 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-7">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-7">12/30/2021 11:22:23 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST (AV:N/AC:M/Au:N/C:N/I:N/A:P)</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">NIST (AV:N/AC:L/Au:N/C:N/I:N/A:P)</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-7-showing"
|
||
>Record truncated, showing 500 of 4459 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-45105/change-record?changeRecordedOn=12/30/2021T11:22:23.687-0500">View Entire Change Record</a><br/>
|
||
<pre>OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:alpha1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:alpha2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta3:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta3-rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta3-rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta4:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0 up to (excluding) 2.3.1
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4 up to (excluding) 2.12.3
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (including) 2.16.0</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sonicwall:6bk1602-0aa12-0tp0_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.7.0
|
||
OR
|
||
cpe:2.3:h:sonicwall:6bk1602-0aa12-0tp0:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sonicwall:6bk1602-0aa22-0tp0_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.7.0
|
||
OR
|
||
cpe:2.3:h:sonicwall:6bk1602-0aa22-0tp0:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sonicwall:6bk1602-0aa32-0tp0_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.7.0
|
||
OR
|
||
cpe:2.3:h:sonicwall:6bk1602-0aa32-0tp0:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sonicwall:6bk1602-0aa42-0tp0_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.7.0
|
||
OR
|
||
cpe:2.3:h:sonicwall:6bk1602-0aa42-0tp0:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sonicwall:6bk1602-0aa52-0tp0_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.7.0
|
||
OR
|
||
cpe:2.3:h:sonicwall:6bk1602-0aa52-0tp0:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:* versions up to (including) 10.0.12
|
||
*cpe:2.3:a:sonicwall:network_security_manager:*:*:*:*:on-premises:*:*:* versions from (including) 2.0 up to (excluding) 3.0
|
||
*cpe:2.3:a:sonicwall:network_security_manager:*:*:*:*:saas:*:*:* versions from (including) 2.0 up to (excluding) 3.0
|
||
*cpe:2.3:a:sonicwall:web_application_firewall:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (excluding) 3.1.0</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 Third Party Advisory, US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-8">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-8">12/28/2021 12:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-8">
|
||
<td
|
||
data-testid="vuln-change-history-8-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-8-type">Description</td>
|
||
<td data-testid="vuln-change-history-8-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-8-new">
|
||
|
||
<pre style="word-break: break-all !important">Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-8">
|
||
<td
|
||
data-testid="vuln-change-history-8-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-8-type">Reference</td>
|
||
<td data-testid="vuln-change-history-8-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-8-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-8">
|
||
<td
|
||
data-testid="vuln-change-history-8-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-8-type">Reference</td>
|
||
<td data-testid="vuln-change-history-8-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-8-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-8">
|
||
<td
|
||
data-testid="vuln-change-history-8-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-8-type">Reference</td>
|
||
<td data-testid="vuln-change-history-8-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-8-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-9">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-9">12/26/2021 10:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-10">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-10">12/26/2021 7:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-11">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-11">12/21/2021 8:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-11">
|
||
<td
|
||
data-testid="vuln-change-history-11-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-11-type">Reference</td>
|
||
<td data-testid="vuln-change-history-11-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-11-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-12">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-12">12/21/2021 6:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-12">
|
||
<td
|
||
data-testid="vuln-change-history-12-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-12-type">Reference</td>
|
||
<td data-testid="vuln-change-history-12-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-12-new">
|
||
|
||
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-13">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-13">12/21/2021 1:15:06 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">Reference</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">Reference</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-14">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-14">12/20/2021 1:48:03 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST (AV:N/AC:L/Au:N/C:N/I:N/A:P)</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">CWE</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-20</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">CWE</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-674</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-14-showing"
|
||
|
||
>Record truncated, showing 500 of 4459 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-45105/change-record?changeRecordedOn=12/20/2021T13:48:03.297-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:alpha1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:alpha2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta3:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta3-rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta3-rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta4:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/19/1 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/19/1 Mailing List, Mitigation, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html Release Notes, Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211218-0001/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211218-0001/ Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5024 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5024 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.zerodayinitiative.com/advisories/ZDI-21-1541/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.zerodayinitiative.com/advisories/ZDI-21-1541/ Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-15">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-15">12/19/2021 7:15:09 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-15">
|
||
<td
|
||
data-testid="vuln-change-history-15-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-15-type">Reference</td>
|
||
<td data-testid="vuln-change-history-15-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-15-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-16">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-16">12/19/2021 11:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">Reference</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.zerodayinitiative.com/advisories/ZDI-21-1541/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-17">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-17">12/19/2021 10:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">Reference</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5024 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-18">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-18">12/18/2021 11:15:06 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-18">
|
||
<td
|
||
data-testid="vuln-change-history-18-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-18-type">Reference</td>
|
||
<td data-testid="vuln-change-history-18-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-18-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/19/1 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-19">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-19">12/18/2021 11:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-19">
|
||
<td
|
||
data-testid="vuln-change-history-19-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-19-type">Reference</td>
|
||
<td data-testid="vuln-change-history-19-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-19-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211218-0001/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2021-45105">CVE-2021-45105</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">12/18/2021</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Apache Software Foundation</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="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" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|