A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 419 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at October 2021 Critical Patch Update: Executive Summary and Analysis.
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.
Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:
Date | Note |
---|---|
2022-January-18 | Rev 3. Updated the essbase affected versions |
2021-October-28 | Rev 2. Changed the product of CVE-2018-20843 from Oracle WebLogic Server Proxy Plug-In to Oracle HTTP Server and added 5.9.0.0.0 to affected versions of Oracle Business Intelligence Enterprise Edition. |
2021-October-19 | Rev 1. Initial Release. |
This Critical Patch Update contains 18 new security patches for Oracle Database Products divided as follows:
This Critical Patch Update contains 9 new security patches plus additional third party patches noted below for Oracle Database Products. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
CVE# | Component | Package and/or Privilege Required | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-35599 | Zero Downtime DB Migration to Cloud | Local Logon | Local Logon | No | 8.2 | Local | Low | High | None | Changed | High | High | High | 21c | |
CVE-2021-25122 | Oracle Database Enterprise Edition (Apache Tomcat) | None | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.0.1, 19c, 21c | |
CVE-2021-35619 | Java VM | Create Procedure | Oracle Net | No | 7.1 | Network | High | Low | Required | Un- changed |
High | High | High | 12.1.0.2, 12.2.0.1, 19c, 21c | |
CVE-2021-2332 | Oracle LogMiner | DBA | Oracle Net | No | 6.7 | Network | Low | High | None | Un- changed |
Low | High | High | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2021-35551 | RDBMS Security | DBA | Oracle Net | No | 5.5 | Network | Low | High | None | Un- changed |
None | Low | High | 12.2.0.1, 19c, 21c | |
CVE-2021-35557 | Core RDBMS | Create Table | Oracle Net | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 12.1.0.2, 12.2.0.1, 19c, 21c | |
CVE-2021-35558 | Core RDBMS | Create Table | Oracle Net | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 12.1.0.2, 12.2.0.1, 19c, 21c | |
CVE-2021-26272 | Oracle Application Express (CKEditor) | None | HTTP | Yes | 4.3 | Network | Low | None | Required | Un- changed |
None | None | Low | Prior to 21.1.0 | |
CVE-2021-35576 | Oracle Database Enterprise Edition Unified Audit | Local Logon | Oracle Net | No | 2.7 | Network | Low | High | None | Un- changed |
None | Low | None | 12.1.0.2, 12.2.0.1, 19c |
This Critical Patch Update contains 5 new security patches for Oracle Essbase. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-35652 | Essbase Administration Services | EAS Console | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | Prior to 11.1.2.4.046, Prior to 21.3 | |
CVE-2021-35651 | Essbase Administration Services | EAS Console | HTTP | No | 8.5 | Network | Low | Low | None | Changed | High | Low | None | Prior to 11.1.2.4.046, Prior to 21.3 | |
CVE-2021-35653 | Essbase Administration Services | EAS Console | HTTP | No | 7.7 | Network | Low | Low | None | Changed | High | None | None | Prior to 11.1.2.4.046, Prior to 21.3 | |
CVE-2021-35654 | Essbase Administration Services | EAS Console | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 11.1.2.4.046, Prior to 21.3 | |
CVE-2021-35655 | Essbase Administration Services | EAS Console | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | Prior to 11.1.2.4.046, Prior to 21.3 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Global Lifecycle Management. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Global Lifecycle Management. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle GoldenGate. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-3740 | Oracle GoldenGate | Install (Dell BSAFE Crypto-J) | Oracle Net | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | Prior to 19.1.0.0.0.210420 |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Graph Server and Client. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-25122 | Oracle Graph Server and Client | Packaging/install (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | Prior to 21.3.0 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle NoSQL Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle REST Data Services. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-28165 | Oracle REST Data Services | General (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 21.3 |
This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-3450 | Oracle Secure Backup | Oracle Secure Backup (OpenSSL) | TLS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | Prior to 18.1.0.1.0 |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Spatial Studio. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Spatial Studio. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle SQL Developer. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle SQL Developer. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 2 new security patches for Oracle Commerce. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-37695 | Oracle Commerce Guided Search | Content Acquisition System (CKEditor) | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 11.3.2 | |
CVE-2021-37695 | Oracle Commerce Merchandising | Merchandising (CKEditor) | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 11.3.2 |
This Critical Patch Update contains 19 new security patches for Oracle Communications Applications. 14 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-3177 | Oracle Communications Pricing Design Center | Pricing (Python) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0.0.3.0 | |
CVE-2021-2351 | Oracle Communications MetaSolv Solution | Reports (JDBC) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 6.3.1 | |
CVE-2021-22118 | Oracle Communications BRM - Elastic Charging Engine | Controller (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 12.0.0.3 | |
CVE-2021-36090 | Oracle Communications Messaging Server | Message Store (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.1 | |
CVE-2021-30468 | Oracle Communications Messaging Server | Security (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.1 | |
CVE-2020-25648 | Oracle Communications Offline Mediation Controller | Storage & Reporting (NSS) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.0.0.3.0 | |
CVE-2019-10086 | Oracle Communications Billing and Revenue Management | Billing Care (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 7.5.0.0.0, 12.0.0.3.0 | |
CVE-2021-23337 | Oracle Communications Design Studio | PSR Designer (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 7.4.2 | |
CVE-2020-6950 | Oracle Communications Pricing Design Center | Services Manager (Eclipse Mojarra) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 12.0.0.3.0 | |
CVE-2021-21409 | Oracle Communications BRM - Elastic Charging Engine | OUI Installer (Netty) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 12.0.0.3 | |
CVE-2021-21409 | Oracle Communications Design Studio | PSR Designer (Netty) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 7.4.2 | |
CVE-2021-21409 | Oracle Communications Messaging Server | Multiplexor (Netty) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 8.1 | |
CVE-2020-17521 | Oracle Communications BRM - Elastic Charging Engine | Orchestration (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 12.0.0.3 | |
CVE-2021-31812 | Oracle Communications Messaging Server | Monitoring (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 8.1 | |
CVE-2021-28657 | Oracle Communications Messaging Server | Monitoring (Apache Tika) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 8.1 | |
CVE-2021-29425 | Oracle Communications Calendar Server | Administration (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.0.0.6.0 | |
CVE-2021-29425 | Oracle Communications Messaging Server | Message Store (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.1 | |
CVE-2021-29425 | Oracle Communications MetaSolv Solution | Reports (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 6.3.1 | |
CVE-2021-33037 | Oracle Communications Pricing Design Center | Pricing (Apache Tomcat) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.0.0.3.0 |
This Critical Patch Update contains 71 new security patches plus additional third party patches noted below for Oracle Communications. 56 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-21345 | Oracle Communications Policy Management | Policy (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 12.5.0 | |
CVE-2021-21783 | Oracle Communications Diameter Signaling Router | Platform (gSOAP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0.0-8.5.0.0 | |
CVE-2017-9841 | Oracle Communications Diameter Signaling Router | Signaling (PHP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0.0-8.5.0.0 | |
CVE-2021-21783 | Oracle Communications EAGLE LNP Application Processor | Patches (gSOAP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 46.7, 46.8, 46.9 | |
CVE-2020-11998 | Oracle Communications Element Manager | Work orders (Apache ActiveMQ) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.2.0.0-8.2.4.0 | |
CVE-2021-21783 | Oracle Communications LSMS | Platform (gSOAP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.1, 13.2, 13.3, 13.4 | |
CVE-2020-17530 | Oracle Communications Policy Management | Enterprise Policy (Apache Struts2) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.5.0 | |
CVE-2020-11998 | Oracle Communications Session Report Manager | Reports (Apache ActiveMQ) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0.0-8.2.2.0 | |
CVE-2020-11998 | Oracle Communications Session Route Manager | Route Manager (Apache ActiveMQ) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0.0-8.2.2.0 | |
CVE-2021-21783 | Tekelec Virtual Operating Environment | Syscheck (gSOAP) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 3.4.0-3.7.1 | |
CVE-2021-23017 | Oracle Communications Control Plane Monitor | Infrastructure (nginx) | HTTP | Yes | 9.4 | Network | Low | None | None | Un- changed |
High | High | Low | 3.4, 4.2, 4.3, 4.4 | |
CVE-2021-23017 | Oracle Communications Fraud Monitor | Infrastructure (nginx) | HTTP | Yes | 9.4 | Network | Low | None | None | Un- changed |
High | High | Low | 3.4-4.4 | |
CVE-2021-23017 | Oracle Communications Operations Monitor | Developer Infrastructure (nginx) | HTTP | Yes | 9.4 | Network | Low | None | None | Un- changed |
High | High | Low | 3.4, 4.2, 4.3, 4.4 | |
CVE-2021-23017 | Oracle Enterprise Telephony Fraud Monitor | Policies (nginx) | HTTP | Yes | 9.4 | Network | Low | None | None | Un- changed |
High | High | Low | 3.4, 4.2, 4.3, 4.4 | |
CVE-2021-22112 | Oracle Communications Element Manager | Work Orders (Spring Security) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 8.2.0.0-8.2.4.0 | |
CVE-2020-10878 | Oracle Communications Diameter Signaling Router | Platform (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 8.0.0.0-8.5.0.0 | |
CVE-2020-10878 | Oracle Communications LSMS | Platform (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 13.1-13.4 | |
CVE-2020-10878 | Tekelec Platform Distribution | Platform (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 7.4.0-7.7.1 | |
CVE-2021-2351 | Oracle Communications Application Session Controller | Signaling (JDBC) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 3.9 | |
CVE-2021-2461 | Oracle Communications Interactive Session Recorder | Provision API | HTTP | Yes | 8.3 | Network | Low | None | None | Changed | Low | Low | Low | 6.4 | |
CVE-2021-2351 | Oracle Communications Session Report Manager | Reports (JDBC) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 8.0.0.0-8.2.5.0 | |
CVE-2021-2351 | Oracle Communications Session Route Manager | Route Manager (JDBC) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 8.2.0.0-8.2.5.0 | |
CVE-2020-10543 | Oracle Communications EAGLE LNP Application Processor | Realtime db (Perl) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed |
None | Low | High | 46.7, 46.8, 46.9 | |
CVE-2020-24750 | Oracle Communications Element Manager | Security (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.2.0.0-8.2.4.0 | |
CVE-2020-24750 | Oracle Communications Policy Management | Policy (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 12.5.0 | |
CVE-2020-24750 | Oracle Communications Session Report Manager | Reports (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.0.0.0-8.2.2.1 | |
CVE-2020-28052 | Oracle Communications Session Report Manager | Reports (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.0.0.0-8.2.4.0 | |
CVE-2020-24750 | Oracle Communications Session Route Manager | Reports (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.2.0.0-8.2.2.1 | |
CVE-2020-28052 | Oracle Communications Session Route Manager | Route Manager (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.2.0.0-8.2.4.0 | |
CVE-2021-22118 | Oracle Communications Element Manager | Work Orders (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.2.0.0-8.2.4.0 | |
CVE-2021-22118 | Oracle Communications Interactive Session Recorder | Monitor (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 6.4 | |
CVE-2021-22118 | Oracle Communications Session Report Manager | Reports (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.0.0.0-8.2.4.0 | |
CVE-2021-22118 | Oracle Communications Session Route Manager | Route Manager (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.0.0.0-8.2.4.0 | |
CVE-2020-29661 | Tekelec Platform Distribution | Storage Management (Kernel) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 7.4.0-7.7.1 | |
CVE-2021-3156 | Tekelec Platform Distribution | Storage Management (Sudo) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 7.4.0-7.7.1 | |
CVE-2021-33560 | Oracle Communications Cloud Native Core Network Repository Function | Measurements (libgcrypt) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 1.14.0 | |
CVE-2020-11994 | Oracle Communications Diameter Signaling Router | IDIH - Visualization (Apache Camel) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.0.0-8.5.0.0 | |
CVE-2020-25649 | Oracle Communications Diameter Signaling Router | IDIH - Visualization (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 8.0.0.0-8.5.0.0 | |
CVE-2021-36090 | Oracle Communications Element Manager | Fault Management (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.0.0-8.2.4.0 | |
CVE-2021-30468 | Oracle Communications Element Manager | Work Orders (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.2 | |
CVE-2021-28165 | Oracle Communications Element Manager | Work Orders (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.2 | |
CVE-2018-20034 | Oracle Communications LSMS | NPA Agent (Flexnet) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 13.1-13.4 | |
CVE-2020-5258 | Oracle Communications Policy Management | Policy (dojo) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.5.0 | |
CVE-2020-5398 | Oracle Communications Policy Management | VNF Manager (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 12.5.0 | |
CVE-2021-28165 | Oracle Communications Services Gatekeeper | Messaging Service (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 7.0 | |
CVE-2020-7226 | Oracle Communications Services Gatekeeper | Payment (Cryptacular) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 7.0 | |
CVE-2021-22696 | Oracle Communications Session Report Manager | Reports (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0.0-8.2.4.0 | |
CVE-2021-36090 | Oracle Communications Session Report Manager | Reports (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.2.0.0-8.2.5.0 | |
CVE-2021-28165 | Oracle Communications Session Report Manager | Reports (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0.0-8.2.4.0 | |
CVE-2021-22696 | Oracle Communications Session Route Manager | Route Manager (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0.0-8.2.4.0 | |
CVE-2021-36090 | Oracle Communications Session Route Manager | Route Manager (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0.0-8.2.5.0 | |
CVE-2021-28165 | Oracle Communications Session Route Manager | Route Manager (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.0.0-8.2.4.0 | |
CVE-2021-25215 | Tekelec Platform Distribution | Storage Management (BIND) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 7.4.0-7.7.1 | |
CVE-2019-10086 | Oracle Communications Policy Management | Policy (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 12.5.0 | |
CVE-2021-23337 | Oracle Communications Cloud Native Core Policy | Signaling (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 1.11.0 | |
CVE-2021-23337 | Oracle Communications Session Border Controller | Routing (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 8.4, 9.0 | |
CVE-2021-23337 | Oracle Enterprise Communications Broker | Routing (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 3.2, 3.3 | |
CVE-2021-2414 | Oracle Communications Session Border Controller | Routing | HTTP | No | 6.8 | Network | Low | High | None | Changed | High | None | None | 8.4, 9.0 | |
CVE-2020-8622 | Oracle Communications Diameter Signaling Router | Provisioning (BIND) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.0.0-8.5.0.0 | |
CVE-2021-30640 | Tekelec Platform Distribution | Console (Apache Tomcat) | HTTP | Yes | 6.5 | Network | High | None | None | Un- changed |
Low | High | None | 7.4.0-7.7.1 | |
CVE-2021-27906 | Oracle Communications Session Report Manager | Reports (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 8.0.0.0-8.2.4.0 | |
CVE-2021-29425 | Oracle Communications Application Session Controller | Signaling (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 3.9 | |
CVE-2021-29425 | Oracle Communications Converged Application Server - Service Controller | Charging (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 6.2 | |
CVE-2021-33037 | Oracle Communications Diameter Signaling Router | Platform (Apache Tomcat) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.0.0.0-8.5.0.0 | |
CVE-2021-33037 | Oracle Communications Policy Management | MediationServer (Apache Tomcat) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.5.0 | |
CVE-2021-29425 | Oracle Communications Session Report Manager | Reports (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.0.0.0-8.2.5.0 | |
CVE-2021-33037 | Oracle Communications Session Report Manager | Reports (Apache Tomcat) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.0.0.0-8.2.4.0 | |
CVE-2021-29425 | Oracle Communications Session Route Manager | Route Manager (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.0.0.0-8.2.5.0 | |
CVE-2021-33037 | Oracle Communications Session Route Manager | Route Manager (Apache Tomcat) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.0.0.0-8.2.4.0 | |
CVE-2021-2416 | Oracle Communications Session Border Controller | Routing | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.4, 9.0 | |
CVE-2020-9488 | Oracle Communications EAGLE FTP Table Base Retrieval | Logging (Apache Log4j) | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 4.5 |
This Critical Patch Update contains 12 new security patches for Oracle Construction and Engineering. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-26691 | Instantis EnterpriseTrack | Core (Apache HTTP Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 17.1, 17.2, 17.3 | |
CVE-2021-2351 | Instantis EnterpriseTrack | Core (JDBC) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 17.1, 17.2, 17.3 | |
CVE-2021-2351 | Primavera Gateway | Admin (JDBC) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7 | |
CVE-2021-36090 | Primavera Gateway | Admin (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7 | |
CVE-2021-36090 | Primavera Unifier | File Management (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2021-23337 | Primavera Gateway | Admin (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7 | |
CVE-2021-23337 | Primavera Unifier | Platform, UI (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2021-36374 | Primavera Gateway | Admin (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7 | |
CVE-2021-28657 | Primavera Unifier | Platform (Apache Tika) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2021-36374 | Primavera Unifier | System Configuration (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2021-33037 | Instantis EnterpriseTrack | Core (Apache Tomcat) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 17.1, 17.2, 17.3 | |
CVE-2021-29425 | Primavera Gateway | Admin (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11 |
This Critical Patch Update contains 18 new security patches for Oracle E-Business Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the October 2021 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (October 2021), My Oracle Support Note 2484000.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-35566 | Oracle Applications Manager | Diagnostics | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2483 | Oracle Content Manager | Content Item Manager | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-35536 | Oracle Deal Management | Miscellaneous | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-35585 | Oracle Incentive Compensation | User Interface | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-35570 | Oracle Mobile Field Service | Admin UI | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2484 | Oracle Operations Intelligence | BIS Operations Intelligence | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-2482 | Oracle Payables | Invoice Approvals | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-35563 | Oracle Shipping Execution | Workflow Events | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.2.6-12.2.10 | |
CVE-2021-2485 | Oracle Trade Management | Quotes | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-35562 | Oracle Universal Work Queue | Work Provider Site Level Administration | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2474 | Oracle Web Analytics | Admin | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-35582 | Oracle Applications Manager | View Reports | HTTP | No | 6.5 | Network | Low | Low | Required | Changed | Low | Low | Low | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-35580 | Oracle Applications Manager | View Reports | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2477 | Oracle Applications Framework | Session Management | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-35554 | Oracle Trade Management | Quotes | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-35569 | Oracle Applications Manager | Diagnostics | HTTP | No | 4.9 | Network | Low | High | None | Un- changed |
High | None | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-35581 | Oracle Applications Manager | View Reports | HTTP | Yes | 4.7 | Network | Low | None | Required | Changed | None | Low | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-35611 | Oracle Sales Offline | Offline Template | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 12.1.1-12.1.3, 12.2.3-12.2.10 |
This Critical Patch Update contains 8 new security patches for Oracle Enterprise Manager. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the October 2021 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2021 Patch Availability Document for Oracle Products, My Oracle Support Note 2796575.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-26691 | Enterprise Manager Ops Center | Networking (Apache HTTP Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.4.0.0 | |
CVE-2021-2137 | Enterprise Manager Base Platform | Policy Framework | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 13.4.0.0, 13.5.0.0 | |
CVE-2021-29505 | Enterprise Manager Ops Center | Guest Management (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.4.0.0 | |
CVE-2021-3518 | Enterprise Manager Ops Center | Guest Management (libxml2) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 12.4.0.0 | |
CVE-2021-3518 | Oracle Real User Experience Insight | End User Experience Management (libxml2) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 13.5.1.0, 13.4.1.0 | |
CVE-2021-2351 | Oracle Real User Experience Insight | End User Experience Management (JDBC) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 13.5.1.0, 13.4.1.0 | |
CVE-2020-25649 | Oracle Application Testing Suite | Load Testing for Web Apps (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 13.3.0.1 | |
CVE-2021-20227 | Enterprise Manager for Oracle Database | Provisioning (SQLite) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
None | None | High | 13.4.0.0 |
This Critical Patch Update contains 44 new security patches for Oracle Financial Services Applications. 26 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-21345 | Oracle Banking Virtual Account Management | Common Core (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-5413 | Oracle Banking Corporate Lending Process Management | Loans (Spring Integration) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-5413 | Oracle Banking Credit Facilities Process Management | Credit Appraisal (Spring Integration) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-5413 | Oracle Banking Supply Chain Finance | Account-Maintenance (Spring Integration) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-5413 | Oracle Banking Virtual Account Management | Common Core (Spring Integration) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-10683 | Oracle FLEXCUBE Core Banking | Bills And Collections (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.7, 11.8, 11.9, 11.10 | |
CVE-2021-29505 | Oracle Banking Cash Management | Accessibility (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-29505 | Oracle Banking Corporate Lending Process Management | Lending (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-29505 | Oracle Banking Credit Facilities Process Management | Credit Appraisal (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-15824 | Oracle Banking Extensibility Workbench | Web UI (Kotlin) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-29505 | Oracle Banking Supply Chain Finance | Account-Maintenance (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-29505 | Oracle Banking Trade Finance Process Management | Dashboard (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-24750 | Oracle Banking Corporate Lending Process Management | Lending (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-28052 | Oracle Banking Corporate Lending Process Management | Loans (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-24750 | Oracle Banking Credit Facilities Process Management | Credit Appraisal (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-28052 | Oracle Banking Credit Facilities Process Management | Credit Appraisal (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-28052 | Oracle Banking Extensibility Workbench | Web UI (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-24750 | Oracle Banking Supply Chain Finance | Invoice (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-28052 | Oracle Banking Supply Chain Finance | Security (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-28052 | Oracle Banking Virtual Account Management | Common Core (Bouncy Castle Java Library) | HTTPS | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-25649 | Oracle Banking Extensibility Workbench | Web UI (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.2, 14.3, 14.5 | |
CVE-2021-36090 | Oracle Banking Platform | Product Accounting (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 2.6.2, 2.7.1, 2.9.0, 2.12.0 | |
CVE-2020-25649 | Oracle Banking Virtual Account Management | Account (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.2, 14.3, 14.5 | |
CVE-2021-36090 | Oracle Financial Services Analytical Applications Infrastructure | Rate Management (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.6-8.1.1 | |
CVE-2021-36090 | Oracle Financial Services Enterprise Case Management | Web UI (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.7.2.0, 8.0.8.1.0 | |
CVE-2019-0227 | Oracle FLEXCUBE Core Banking | Bills And Collections (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 11.7, 11.8, 11.9, 11.10 | |
CVE-2020-8203 | Oracle Banking Virtual Account Management | Account (Lodash) | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
None | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-23337 | Oracle Banking Corporate Lending Process Management | Lending (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-23337 | Oracle Banking Credit Facilities Process Management | Collateral Review (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-23337 | Oracle Banking Extensibility Workbench | Banking (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-23337 | Oracle Banking Supply Chain Finance | Invoice (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-23337 | Oracle Banking Trade Finance Process Management | Dashboard (Lodash) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2020-6950 | Oracle Banking Enterprise Default Management | Collections (Eclipse Mojarra) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 2.10.0, 2.12.0 | |
CVE-2020-6950 | Oracle Banking Platform | Investment Account (Eclipse Mojarra) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 2.6.2, 2.7.1, 2.9.0, 2.12.0 | |
CVE-2021-26272 | Oracle Financial Services Model Management and Governance | Model Governance (CKEditor) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 8.0.8.0.0-8.1.0.0.0 | |
CVE-2021-21409 | Oracle Banking Corporate Lending Process Management | Lending (Netty) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 14.2, 14.3, 14.5 | |
CVE-2021-21409 | Oracle Banking Credit Facilities Process Management | Collateral Review (Netty) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 14.2, 14.3, 14.5 | |
CVE-2021-21409 | Oracle Banking Trade Finance Process Management | Dashboard (Netty) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 14.2, 14.3, 14.5 | |
CVE-2021-31812 | Oracle Banking Corporate Lending Process Management | Lending (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.2, 14.3, 14.5 | |
CVE-2021-31812 | Oracle Banking Credit Facilities Process Management | Collateral Review (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.2, 14.3, 14.5 | |
CVE-2021-31812 | Oracle Banking Supply Chain Finance | Security (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.2, 14.3, 14.5 | |
CVE-2021-27906 | Oracle Banking Trade Finance Process Management | Dashboard (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.2, 14.3, 14.5 | |
CVE-2021-27906 | Oracle Banking Virtual Account Management | Common Core (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.2, 14.3, 14.5 | |
CVE-2021-36374 | Oracle Financial Services Analytical Applications Infrastructure | Publish Catalog (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 8.0.6-8.1.1 |
This Critical Patch Update contains 38 new security patches for Oracle Fusion Middleware. 30 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update October 2021 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2021 Patch Availability Document for Oracle Products, My Oracle Support Note 2796575.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-13990 | Oracle WebCenter Sites | WebCenter Sites (Terracotta Quartz Scheduler) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2018-8088 | Oracle WebLogic Server | Web Services (slf4j-ext) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.1.3.0.0 | |
CVE-2021-35617 | Oracle WebLogic Server | Coherence Container | IIOP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-29505 | Oracle Business Activity Monitoring | General (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-29505 | Oracle WebCenter Portal | Discussion Forums (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-29505 | Oracle WebCenter Sites | WebCenter Sites (XStream) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-30468 | Oracle Business Intelligence Enterprise Edition | Analytics Server (Apache CXF) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-25649 | Oracle Data Integrator | Install, config, upgrade (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.2.1.4.0 | |
CVE-2021-35572 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35573 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35662 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35661 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35574 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35660 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35659 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35658 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35657 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-35656 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2020-5258 | Oracle WebCenter Sites | WebCenter Sites (dojo) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-7226 | Oracle WebLogic Server | Core (Cryptacular) | SAML | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-35620 | Oracle WebLogic Server | Core | T3 | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2018-20843 | Oracle HTTP Server | SSL Module (LibExpat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-26272 | Oracle WebCenter Sites | WebCenter Sites (CKEditor) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-11022 | Oracle WebLogic Server | Web Services (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-23841 | Oracle Business Intelligence Enterprise Edition | Analytics Server (OpenSSL) | HTTPS | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-35666 | Oracle HTTP Server | OSSL Module | HTTPS | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | 11.1.1.9.0 | |
CVE-2020-1971 | Oracle HTTP Server | SSL Module (OpenSSL) | HTTPS | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 12.2.1.4.0 | |
CVE-2018-10237 | Oracle WebLogic Server | Web Services (Google Guava) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 12.1.3.0.0 | |
CVE-2021-36374 | Oracle Enterprise Repository | Security Subsystem - 12c (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 11.1.1.7.0 | |
CVE-2021-36374 | Oracle Real-Time Decision Server | Platform Installation (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 3.2.0.0, 11.1.1.9.0 | |
CVE-2021-27906 | Oracle WebCenter Sites | WebCenter Sites (Apache PDFbox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-12415 | Oracle WebCenter Sites | WebCenter Sites (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-12400 | Oracle WebLogic Server | Web Services (Apache Santuario XML Security For Java) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
None | High | None | 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-29425 | Oracle GoldenGate Application Adapters | Application Adapters (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 19.1.0.0.0 | |
CVE-2021-29425 | Oracle Real-Time Decision Server | Decision Server (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 3.2.0.0 | |
CVE-2021-29425 | Oracle WebLogic Server | Console (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-35552 | Oracle WebLogic Server | Diagnostics | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-2480 | Oracle HTTP Server | Web Listener | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
None | Low | None | 11.1.1.9.0 |
This Critical Patch Update contains 6 new security patches for Oracle Health Sciences Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-17195 | Oracle Healthcare Data Repository | Install Utility (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.1.0 | |
CVE-2021-22118 | Oracle Healthcare Data Repository | Service Framework (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.1.0 | |
CVE-2020-11022 | Oracle Health Sciences Central Coding | UI (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 6.2.0, 6.3.0 | |
CVE-2020-11023 | Oracle Health Sciences InForm | UI (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 6.3.0 | |
CVE-2020-17521 | Oracle Healthcare Data Repository | Install Utility (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 7.0.2 | |
CVE-2021-28657 | Oracle Healthcare Foundation | Security (Apache Tika) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 7.3, 8.0, 8.1 |
This Critical Patch Update contains 1 new security patch for Oracle Hospitality Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-11022 | Oracle Hospitality Cruise Shipboard Property Management System | Next-Gen SPMS (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 20.1.0 |
This Critical Patch Update contains 6 new security patches for Oracle Hyperion. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-35665 | Hyperion Financial Reporting | Repository | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 11.2.6.0 | |
CVE-2019-11358 | Hyperion Planning | Hyperion Planning (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 11.1.2.4, 11.2.6.0 | |
CVE-2021-27906 | Hyperion Financial Reporting | Server Components (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 11.1.2.4, 11.2.6.0 | |
CVE-2021-29425 | Hyperion Financial Management | Security (Apache Commons IO) | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 11.1.2.4, 11.2.6.0 | |
CVE-2019-7317 | Hyperion Infrastructure Technology | Installation and Configuration (libpng) | HTTP | Yes | 5.3 | Network | High | None | Required | Un- changed |
None | None | High | 11.2.6.0 | |
CVE-2020-27218 | Hyperion Infrastructure Technology | Installation and Configuration (Eclipse Jetty) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
None | Low | Low | 11.2.6.0 |
This Critical Patch Update contains 16 new security patches for Oracle Insurance Applications. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2016-1000031 | Oracle Documaker | Development tools (Apache Commons FileUpload) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.6.0 - 12.6.4 | |
CVE-2019-13990 | Oracle Documaker | Development tools (Terracotta Quartz Scheduler) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.6.0 - 12.6.4 | |
CVE-2020-10683 | Oracle Documaker | Development tools (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.6.0 - 12.6.4 | |
CVE-2019-17195 | Oracle Insurance Policy Administration | Architecture (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.0.0 - 11.3.1 | |
CVE-2020-11987 | Oracle Insurance Policy Administration | Architecture (Apache Batik) | HTTP | Yes | 8.2 | Network | Low | None | None | Un- changed |
High | Low | None | 11.0.0 - 11.3.1 | |
CVE-2020-36189 | Oracle Documaker | Development tools (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 12.6.3, 12.6.4 | |
CVE-2021-22118 | Oracle Documaker | Development tools (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 12.6.0 - 12.6.4 | |
CVE-2021-22118 | Oracle Insurance Policy Administration | Architecture (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 11.0.0 - 11.3.1 | |
CVE-2020-5258 | Oracle Documaker | Development tools (dojo) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.6.0 - 12.6.4 | |
CVE-2020-5398 | Oracle Insurance Calculation Engine | Architecture (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 11.0.0 - 11.3.1 | |
CVE-2019-10086 | Oracle Documaker | Development tools (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 12.6.0 - 12.6.4 | |
CVE-2019-10086 | Oracle Insurance Policy Administration | Architecture (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 11.0.0 - 11.3.1 | |
CVE-2021-36374 | Oracle Insurance Policy Administration | Architecture (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 11.0.0 - 11.3.1 | |
CVE-2020-17521 | Oracle Insurance Policy Administration | Architecture (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 11.0.0 - 11.3.1 | |
CVE-2021-37695 | Oracle Documaker | Development tools (CKEditor) | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 12.6.3, 12.6.4 | |
CVE-2021-29425 | Oracle Documaker | Development tools (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.6.0 - 12.6.4 |
This Critical Patch Update contains 15 new security patches for Oracle Java SE. 13 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-3517 | Java SE | JavaFX (libxml) | Multiple | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | Java SE: 8u301 | See Note 1 |
CVE-2021-35560 | Java SE | Deployment | Multiple | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | Java SE: 8u301 | See Note 1 |
CVE-2021-27290 | Oracle GraalVM Enterprise Edition | Node (Node.js) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | |
CVE-2021-35567 | Java SE, Oracle GraalVM Enterprise Edition | Libraries | Kerberos | No | 6.8 | Network | Low | Low | Required | Changed | High | None | None | Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 2 |
CVE-2021-35550 | Java SE, Oracle GraalVM Enterprise Edition | JSSE | TLS | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 2 |
CVE-2021-3522 | Java SE | JavaFX (GStreamer) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | Java SE: 8u301 | See Note 1 |
CVE-2021-35586 | Java SE, Oracle GraalVM Enterprise Edition | ImageIO | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 2 |
CVE-2021-35564 | Java SE, Oracle GraalVM Enterprise Edition | Keytool | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 2 |
CVE-2021-35556 | Java SE, Oracle GraalVM Enterprise Edition | Swing | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 1 |
CVE-2021-35559 | Java SE, Oracle GraalVM Enterprise Edition | Swing | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 2 |
CVE-2021-35561 | Java SE, Oracle GraalVM Enterprise Edition | Utility | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 2 |
CVE-2021-35565 | Java SE, Oracle GraalVM Enterprise Edition | JSSE | TLS | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 3 |
CVE-2021-35578 | Java SE, Oracle GraalVM Enterprise Edition | JSSE | TLS | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 3 |
CVE-2021-35603 | Java SE, Oracle GraalVM Enterprise Edition | JSSE | TLS | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 2 |
CVE-2021-35588 | Java SE, Oracle GraalVM Enterprise Edition | Hotspot | Multiple | Yes | 3.1 | Network | High | None | Required | Un- changed |
None | None | Low | Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3, 21.2.0 | See Note 2 |
This Critical Patch Update contains 11 new security patches for Oracle JD Edwards. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-22884 | JD Edwards EnterpriseOne Tools | E1 Dev Platform Tech (Node.js) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | Prior to 9.2.6.0 | |
CVE-2020-25648 | JD Edwards EnterpriseOne Tools | Enterprise Infrastructure (NSS) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 9.2.6.0 | |
CVE-2020-8203 | JD Edwards EnterpriseOne Tools | E1 Dev Platform Tech (Lodash) | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
None | High | High | Prior to 9.2.6.0 | |
CVE-2021-3450 | JD Edwards EnterpriseOne Tools | Enterprise Infrastructure (OpenSSL) | TLS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | Prior to 9.2.6.0 | |
CVE-2021-3450 | JD Edwards World Security | World Software Security (OpenSSL) | TLS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | A9.4 | |
CVE-2020-27216 | JD Edwards EnterpriseOne Tools | Installation (Eclipse Jetty) | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | Prior to 9.2.6.0 | |
CVE-2021-26272 | JD Edwards EnterpriseOne Tools | Web Runtime (CKEditor) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | Prior to 9.2.6.0 | |
CVE-2020-17521 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | Prior to 9.2.6.0 | |
CVE-2021-20227 | JD Edwards EnterpriseOne Tools | Enterprise Infrastructure (SQLite) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
None | None | High | Prior to 9.2.6.0 | |
CVE-2020-13956 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator (Apache HttpClient) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | Prior to 9.2.6.0 | |
CVE-2020-13956 | JD Edwards EnterpriseOne Tools | Monitoring and Diagnostics (Apache HttpClient) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | Prior to 9.2.6.0 |
This Critical Patch Update contains 66 new security patches for Oracle MySQL. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-22931 | MySQL Cluster | Cluster: General (Node.js) | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.26 and prior | |
CVE-2021-3711 | MySQL Server | Server: Packaging (OpenSSL) | MySQL Protocol | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 5.7.35 and prior, 8.0.26 and prior | |
CVE-2021-22112 | MySQL Enterprise Monitor | Monitoring: General (Spring Security) | HTTPS | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 8.0.25 and prior | |
CVE-2021-3518 | MySQL Workbench | MySQL Workbench (libxml2) | MySQL Workbench | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 8.0.26 and prior | |
CVE-2021-22118 | MySQL Enterprise Monitor | Monitoring: General (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.0.25 and prior | |
CVE-2021-22926 | MySQL Server | Server: Compiling (cURL) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 5.7.35 and prior, 8.0.26 and prior | |
CVE-2021-36222 | MySQL Server | Server: Compiling (Kerberos) | MySQL Protocol | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35583 | MySQL Server | Server: Windows | MySQL Protocol | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-3712 | MySQL Workbench | MySQL Workbench (OpenSSL) | MySQL Workbench | Yes | 7.4 | Network | High | None | None | Un- changed |
High | None | High | 8.0.26 and prior | |
CVE-2021-35610 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 7.1 | Network | Low | Low | None | Un- changed |
None | Low | High | 8.0.26 and prior | |
CVE-2021-3712 | MySQL Enterprise Monitor | Monitoring: General (OpenSSL) | None | No | 6.7 | Local | High | None | None | Un- changed |
High | None | High | 8.0.25 and prior | |
CVE-2021-35597 | MySQL Client | C API | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35607 | MySQL Server | Server: DML | MYSQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-2481 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35590 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Adjacent Network |
High | High | Required | Un- changed |
High | High | High | 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior, 8.0.26 and prior | |
CVE-2021-35592 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Adjacent Network |
High | High | Required | Un- changed |
High | High | High | 7.5.23 and prior, 7.6.19 and prior, 8.0.26 and prior | |
CVE-2021-35593 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Adjacent Network |
High | High | Required | Un- changed |
High | High | High | 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior, 8.0.26 and prior | |
CVE-2021-35594 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Adjacent Network |
High | High | Required | Un- changed |
High | High | High | 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior, 8.0.26 and prior | |
CVE-2021-35598 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Adjacent Network |
High | High | Required | Un- changed |
High | High | High | 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior, 8.0.26 and prior | |
CVE-2021-35621 | MySQL Cluster | Cluster: General | Multiple | No | 6.3 | Adjacent Network |
High | High | Required | Un- changed |
High | High | High | 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior, 8.0.26 and prior | |
CVE-2021-2471 | MySQL Connectors | Connector/J | MySQL Protocol | No | 5.9 | Network | High | High | None | Un- changed |
High | None | High | 8.0.26 and prior | |
CVE-2021-35604 | MySQL Server | InnoDB | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed |
None | Low | High | 5.7.35 and prior, 8.0.26 and prior | |
CVE-2021-35612 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 5.5 | Network | Low | High | None | Un- changed |
None | Low | High | 8.0.26 and prior | |
CVE-2021-20227 | MySQL Workbench | MySQL Workbench (SQLite) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-33037 | MySQL Enterprise Monitor | Monitoring: General (Apache Tomcat) | Apache JServ Protocol (AJP) | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.0.25 and prior | |
CVE-2021-29425 | MySQL Enterprise Monitor | Monitoring: General (Apache Commons IO) | HTTPS | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.0.25 and prior | |
CVE-2021-35608 | MySQL Server | Server: Group Replication Plugin | MySQL Protocol | No | 5.3 | Network | High | Low | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35602 | MySQL Server | Server: Options | MySQL Protocol | No | 5.0 | Network | High | High | None | Un- changed |
None | Low | High | 8.0.26 and prior | |
CVE-2021-35577 | MySQL Server | Server: Optimizer | MySQL Protcol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-2478 | MySQL Server | Server: DML | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-2479 | MySQL Server | Server: DML | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35537 | MySQL Server | Server: DML | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-35591 | MySQL Server | Server: DML | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35596 | MySQL Server | Server: Error Handling | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35648 | MySQL Server | Server: FTS | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35631 | MySQL Server | Server: GIS | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35626 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35627 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35628 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35629 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-35575 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35634 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35635 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35636 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35638 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35641 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35642 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35643 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35644 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35645 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35646 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35647 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35630 | MySQL Server | Server: Options | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | High | None | 8.0.26 and prior | |
CVE-2021-35637 | MySQL Server | Server: PS | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35546 | MySQL Server | Server: Replication | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35622 | MySQL Server | Server: Security: Encryption | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35624 | MySQL Server | Server: Security: Privileges | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | High | None | 5.7.35 and prior, 8.0.26 and prior | |
CVE-2021-35639 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35632 | MySQL Server | Server: Data Dictionary | None | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | 8.0.26 and prior | |
CVE-2021-35584 | MySQL Cluster | Cluster: ndbcluster/plugin DDL | Multiple | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 8.0.26 and prior | |
CVE-2021-35613 | MySQL Cluster | Cluster: General | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | 8.0.26 and prior | |
CVE-2021-35640 | MySQL Server | Server: DDL | MySQL Protocol | No | 2.7 | Network | Low | High | None | Un- changed |
None | Low | None | 8.0.26 and prior | |
CVE-2021-35633 | MySQL Server | Server: Logging | MySQL Protocol | No | 2.7 | Network | Low | High | None | Un- changed |
None | None | Low | 8.0.26 and prior | |
CVE-2021-35625 | MySQL Server | Server: Security: Privileges | MySQL Protocol | No | 2.7 | Network | Low | High | None | Un- changed |
Low | None | None | 8.0.26 and prior | |
CVE-2021-35623 | MySQL Server | Server: Security: Roles | MySQL Protocol | No | 2.7 | Network | Low | High | None | Un- changed |
Low | None | None | 8.0.26 and prior | |
CVE-2021-35618 | MySQL Cluster | Cluster: General | Multiple | No | 1.8 | Adjacent Network |
High | High | Required | Un- changed |
None | None | Low | 8.0.26 and prior |
This Critical Patch Update contains 17 new security patches for Oracle PeopleSoft. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-23926 | PeopleSoft Enterprise PeopleTools | nVision (XMLBeans) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 8.57, 8.58, 8.59 | |
CVE-2021-35543 | PeopleSoft Enterprise CC Common Application Objects | Activity Guide Composer | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 9.2 | |
CVE-2021-36090 | PeopleSoft Enterprise PeopleTools | Cloud Manager (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.57, 8.58, 8.59 | |
CVE-2020-1967 | PeopleSoft Enterprise PeopleTools | DPK (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.57, 8.58, 8.59 | |
CVE-2021-35609 | PeopleSoft Enterprise PeopleTools | SQR | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 8.57, 8.58, 8.59 | |
CVE-2021-28363 | PeopleSoft Enterprise PeopleTools | Porting (urllib3) | HTTPS | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 8.59 | |
CVE-2021-35595 | PeopleSoft Enterprise PeopleTools | Business Interlink | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.57, 8.58, 8.59 | |
CVE-2021-35568 | PeopleSoft Enterprise PeopleTools | Rich Text Editor | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.57, 8.58, 8.59 | |
CVE-2021-35606 | PeopleSoft Enterprise CS Campus Community | Notification Framework | HTTP | No | 5.7 | Adjacent Network |
Low | Low | None | Un- changed |
High | None | None | 9.0, 9.2 | |
CVE-2021-35601 | PeopleSoft Enterprise CS SA Integration Pack | Students Administration | HTTP | No | 5.7 | Adjacent Network |
Low | Low | None | Un- changed |
High | None | None | 9.0, 9.2 | |
CVE-2021-27906 | PeopleSoft Enterprise PeopleTools | Elastic Search (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 8.58, 8.59 | |
CVE-2019-12415 | PeopleSoft Enterprise PeopleTools | nVision (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 8.57, 8.58, 8.59 | |
CVE-2021-35571 | PeopleSoft Enterprise CS Academic Advisement | Advising Notes | HTTP | No | 5.4 | Network | Low | Low | None | Un- changed |
Low | Low | None | 9.2 | |
CVE-2021-35553 | PeopleSoft Enterprise CS Student Records | Class Search | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 9.2 | |
CVE-2021-35541 | PeopleSoft Enterprise SCM | Supplier Portal | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 9.2 | |
CVE-2021-29425 | PeopleSoft Enterprise PeopleTools | Updates Change Assistant (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.57, 8.58 | |
CVE-2020-13956 | PeopleSoft Enterprise PeopleTools | Updates Change Assistant (Apache HttpClient) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.57, 8.58 |
This Critical Patch Update contains 26 new security patches for Oracle Retail Applications. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2351 | Oracle Retail Store Inventory Management | SIM Integration (JDBC) | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 14.1, 15.0, 16.0 | |
CVE-2021-22118 | Oracle Retail Assortment Planning | Plan (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 16.0 | |
CVE-2021-22118 | Oracle Retail Merchandising System | Foundation (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 19.0.1 | |
CVE-2021-22118 | Oracle Retail Predictive Application Server | RPAS Fusion Client (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2020-25649 | Oracle Retail Customer Management and Segmentation Foundation | Segment (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 16.0-19.0 | |
CVE-2020-25649 | Oracle Retail Merchandising System | Foundation (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 15.0.3 | |
CVE-2020-6950 | Oracle Retail Merchandising System | Foundation (Eclipse Mojarra) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 19.0.1 | |
CVE-2020-1945 | Oracle Retail Returns Management | Return Tickets (Apache Ant) | None | No | 6.3 | Local | High | Low | None | Un- changed |
High | High | None | 14.0, 14.1 | |
CVE-2021-35043 | Oracle Retail Back Office | Employee (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 14.0, 14.1 | |
CVE-2021-35043 | Oracle Retail Central Office | Transaction Tracker (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 14.0, 14.1 | |
CVE-2021-35043 | Oracle Retail Returns Management | Policy Evaluation (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 14.0, 14.1 | |
CVE-2021-36374 | Oracle Retail Advanced Inventory Planning | Operations & Maintenance (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.1, 15.0, 16.0 | |
CVE-2021-36374 | Oracle Retail Back Office | Employee (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.0, 14.1 | |
CVE-2021-36374 | Oracle Retail Bulk Data Integration | BDI Job Scheduler (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 16.0.3, 19.0.1 | |
CVE-2021-36374 | Oracle Retail Central Office | Transaction Tracker (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.0, 14.1 | |
CVE-2021-36374 | Oracle Retail Extract Transform and Load | Mathematical Operators (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 13.2.8 | |
CVE-2021-36374 | Oracle Retail Financial Integration | EBS Integration Bugs (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.1.3.2, 15.0.4.0, 16.0.3.0 | |
CVE-2021-36374 | Oracle Retail Integration Bus | RIB Kernal (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.1.3.2, 15.0.4.0, 16.0.3.0, 19.0.1.0 | |
CVE-2021-36374 | Oracle Retail Merchandising System | Foundation (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 19.0.1 | |
CVE-2021-36374 | Oracle Retail Point-of-Service | Pricing (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.0, 14.1 | |
CVE-2021-36374 | Oracle Retail Predictive Application Server | RPAS Server (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2021-36374 | Oracle Retail Service Backbone | RSB Installation (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.1.3.2, 15.0.4.0, 16.0.3.0, 19.0.1.0 | |
CVE-2021-36374 | Oracle Retail Store Inventory Management | SIM Integration (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 14.1, 15.0, 16.0 | |
CVE-2021-29425 | Oracle Retail Customer Management and Segmentation Foundation | Segment (Apache Commons IO) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 16.0-19.0 | |
CVE-2020-13956 | Oracle Retail Customer Management and Segmentation Foundation | Segment (Apache HTTPClient) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 16.0-19.0 | |
CVE-2020-8908 | Oracle Retail Customer Management and Segmentation Foundation | Segment (Google Guava) | None | No | 3.3 | Local | Low | Low | None | Un- changed |
Low | None | None | 16.0-19.0 |
This Critical Patch Update contains 6 new security patches for Oracle Siebel CRM. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-28165 | Siebel Core - Automation | Test Automation (Eclipse Jetty) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 21.9 and prior | |
CVE-2021-25122 | Siebel UI Framework | EAI (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 21.9 and prior | |
CVE-2016-2183 | Siebel UI Framework | EAI, SWSE (OpenSSL) | TLS | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 21.9 and prior | |
CVE-2020-9484 | Siebel Apps - Marketing | Marketing (Apache Tomcat) | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | 21.9 and prior | |
CVE-2021-26272 | Siebel UI Framework | Open UI (CKEditor) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 21.9 and prior | |
CVE-2020-9488 | Siebel Apps - Marketing | Marketing (Apache Log4j) | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 21.9 and prior |
This Critical Patch Update contains 5 new security patches for Oracle Supply Chain. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-28165 | Oracle Autovue for Agile Product Lifecycle Management | Autovue Viewer Integration (Eclipse Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 21.0.2 | |
CVE-2020-25649 | Oracle Autovue for Agile Product Lifecycle Management | Autovue Viewer Integration (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 21.0.2 | |
CVE-2020-17521 | Oracle Agile PLM | Security (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 9.3.3, 9.3.6 | |
CVE-2021-35616 | Oracle Transportation Management | UI Infrastructure | HTTP | No | 5.4 | Network | Low | Low | None | Un- changed |
Low | Low | None | 6.4.3 | |
CVE-2021-2476 | Oracle Transportation Management | Authentication | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 6.4.3 |
This Critical Patch Update contains 5 new security patches for Oracle Systems. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-26691 | Oracle ZFS Storage Appliance Kit | Operating System Image | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.8 | |
CVE-2021-35539 | Oracle Solaris | Filesystem | None | No | 6.5 | Local | Low | Low | None | Changed | None | None | High | 11 | |
CVE-2021-35589 | Oracle Solaris | Device drivers | None | No | 6.0 | Local | Low | High | None | Changed | None | None | High | 11 | |
CVE-2021-35549 | Oracle Solaris | Utility | None | No | 3.9 | Local | Low | Low | Required | Un- changed |
None | Low | Low | 11 | |
CVE-2020-1968 | Oracle Ethernet Switch ES2-64, Oracle Ethernet Switch ES2-72 | Firmware (OpenSSL) | HTTPS | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 2.0.0.14 |
This Critical Patch Update contains 1 new security patch for Oracle Utilities Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-36374 | Oracle Utilities Framework | General (Apache Ant) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0 - 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0 |
This Critical Patch Update contains 8 new security patches for Oracle Virtualization. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-35538 | Oracle VM VirtualBox | Core | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | Prior to 6.1.28 | See Note 1 |
CVE-2021-35545 | Oracle VM VirtualBox | Core | None | No | 6.7 | Local | Low | High | None | Changed | Low | None | High | Prior to 6.1.28 | |
CVE-2021-35540 | Oracle VM VirtualBox | Core | None | No | 5.5 | Local | Low | Low | None | Un- changed |
None | None | High | Prior to 6.1.28 | |
CVE-2021-35649 | Oracle Secure Global Desktop | Server | Multiple | No | 5.4 | Network | Low | Low | None | Un- changed |
Low | None | Low | 5.6 | |
CVE-2021-33037 | Oracle Secure Global Desktop | Core (Apache Tomcat) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 5.6 | |
CVE-2021-35650 | Oracle Secure Global Desktop | Client | Multiple | No | 4.6 | Network | Low | Low | Required | Un- changed |
Low | None | Low | 5.6 | |
CVE-2021-35542 | Oracle VM VirtualBox | Core | None | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | Prior to 6.1.28 | |
CVE-2021-2475 | Oracle VM VirtualBox | Core | None | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | Prior to 6.1.28 |