A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 329 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at January 2021 Critical Patch Update: Executive Summary and Analysis.
Please note that since the release of the October 2020 Critical Patch Update, Oracle has released a Security Alert for Oracle WebLogic Server: CVE-2020-14750 (November 1, 2020). Customers are strongly advised to apply this Critical Patch Update, which includes patches for this Alert as well as additional patches.
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.
Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
Oracle lists updates that address vulnerabilities in third-party components which are not exploitable in the context of their inclusion in their respective Oracle product beneath the product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program.:
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:
Date | Note |
---|---|
2021-February-22 | Rev 3. Updated the affected versions for CVE-2021-2047 |
2021-January-25 | Rev 2. Update to Credit Statements. |
2021-January-19 | Rev 1. Initial Release. |
This Critical Patch Update contains 8 new security patches plus additional third party patches noted below for Oracle Database Products. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
CVE# | Component | Package and/or Privilege Required | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2035 | RDBMS Scheduler | Export Full Database | Oracle Net | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.1.0.2, 12.2.0.1, 18c, 19c | |
CVE-2021-2018 | Advanced Networking Option | None | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 18c, 19c | See Note 1 |
CVE-2021-2054 | RDBMS Sharding | Create Any Procedure, Create Any View, Create Any Trigger | Oracle Net | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 12.2.0.1, 18c, 19c | |
CVE-2021-2116 | Oracle Application Express Opportunity Tracker | Valid User Account | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | Prior to 20.2 | |
CVE-2021-2117 | Oracle Application Express Survey Builder | Valid User Account | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | Prior to 20.2 | |
CVE-2021-1993 | Java VM | Create Session | Oracle Net | No | 4.8 | Network | High | Low | Required | Un- changed |
None | High | None | 12.1.0.2, 12.2.0.1, 18c, 19c | |
CVE-2021-2045 | Oracle Text | Create Session | Oracle Net | No | 3.1 | Network | High | Low | None | Un- changed |
None | None | Low | 12.1.0.2, 12.2.0.1, 18c, 19c | |
CVE-2021-2000 | Unified Audit | SYS Account | Oracle Net | No | 2.4 | Network | Low | High | Required | Un- changed |
None | Low | None | 12.1.0.2, 12.2.0.1, 18c, 19c |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Global Lifecycle Management. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Global Lifecycle Management. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Secure Backup. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Secure Backup. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
There are no exploitable vulnerabilities for these products. Third party patches for non-exploitable CVEs are noted below. |
This Critical Patch Update contains 8 new security patches for Oracle Communications Applications. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-14195 | Oracle Communications Calendar Server | REST API (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.0.0.4.0 | |
CVE-2020-14195 | Oracle Communications Contacts Server | REST API (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.0.0.5.0 | |
CVE-2019-17566 | Oracle Communications MetaSolv Solution | Print Preview (Apache Batik) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 6.3.0-6.3.1 | |
CVE-2020-13871 | Oracle Communications Network Charging and Control | Common (SQLite) | SQL | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 6.0.1, 12.0.2 | |
CVE-2019-10086 | Oracle Communications BRM - Elastic Charging Engine | Coherence Query (Apache Commons BeanUtils) | TCP/IP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 11.3.0.9, 12.0.0.3 | |
CVE-2019-10086 | Oracle Communications MetaSolv Solution | Online Help (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 6.3.0-6.3.1 | |
CVE-2020-5421 | Oracle Communications BRM - Elastic Charging Engine | Orchestration, Processor and Messages (Spring Framework) | TCP/IP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 11.3.0.9, 12.0.0.3 | |
CVE-2020-1945 | Oracle Communications ASAP | Core (Apache Ant) | None | No | 6.2 | Local | Low | None | None | Un- changed |
High | None | None | 7.3 |
This Critical Patch Update contains 12 new security patches for Oracle Communications. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-7164 | Oracle Communications Operations Monitor | ORMB DB Query in VSP (SQLAlchemy) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 4.2, 4.3 | |
CVE-2020-24750 | Oracle Communications Diameter Signaling Router (DSR) | IDIH (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.0.0-8.2.2 | |
CVE-2020-27216 | Oracle Communications Application Session Controller | Core (Eclipse Jetty) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 3.9m0p2 | |
CVE-2020-27216 | Oracle Communications Element Manager | REST API (Eclipse Jetty) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 8.2.1.0-8.2.2.1 | |
CVE-2020-14147 | Oracle Communications Operations Monitor | In-Memeory DB for FDP/VSP (Redis) | HTTP | No | 7.7 | Network | Low | Low | None | Changed | None | None | High | 3.4, 4.1, 4.2, 4.3 | |
CVE-2019-17566 | Oracle Communications Application Session Controller | Core (Apache Batik) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 3.9m0p2 | |
CVE-2020-11080 | Oracle Enterprise Communications Broker | System (nghttp2) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 3.1, 3.2 | |
CVE-2019-10086 | Oracle Communications Diameter Signaling Router (DSR) | IDIH (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.0.0-8.2.2 | |
CVE-2019-10086 | Oracle SD-WAN Edge | Management (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 9.0 | |
CVE-2020-10723 | Oracle Enterprise Communications Broker | System (DPDK) | None | No | 6.7 | Local | Low | High | None | Un- changed |
High | High | High | 3.1, 3.2 | |
CVE-2020-5421 | Oracle Communications Session Report Manager | Core (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 8.2.1.0-8.2.2.1 | |
CVE-2019-1559 | Oracle Communications Performance Intelligence Center (PIC) Software | Security (OpenSSL) | HTTPS | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | 10.4.0.2 |
This Critical Patch Update contains 7 new security patches for Oracle Construction and Engineering. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-25020 | Primavera Unifier | Platform (MPXJ) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 16.1, 16.2, 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2019-17566 | Instantis EnterpriseTrack | Dashboard module (Apache Batik) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 17.1-17.3 | |
CVE-2020-11979 | Primavera Gateway | Admin (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 16.2.0-16.2.11, 17.12.0-17.12.9 | |
CVE-2020-11979 | Primavera Unifier | Core, Config (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 16.1, 16.2, 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2019-10086 | Primavera Unifier | Core (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 16.1, 16.2, 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2020-5421 | Primavera Gateway | Admin (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 16.2.0-16.2.11, 17.12.0-17.12.9, 18.8.0-18.8.10, 19.12.0-19.12.10 | |
CVE-2020-5421 | Primavera P6 Enterprise Project Portfolio Management | Web access (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 16.1.0-16.2.20, 17.1.0-17.12.19, 18.1.0-18.8.21, 19.12.0-19.12.10 |
This Critical Patch Update contains 31 new security patches for Oracle E-Business Suite. 29 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the January 2021 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (January 2021), My Oracle Support Note 2737201.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2029 | Oracle Scripting | Miscellaneous | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.1.1-12.1.3, 12.2.3-12.2.8 | |
CVE-2021-2100 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2101 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2093 | Oracle Common Applications | CRM User Management Framework | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2114 | Oracle Common Applications Calendar | Applications Calendar | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2034 | Oracle Common Applications Calendar | Tasks | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3 | |
CVE-2021-2084 | Oracle CRM Technical Foundation | Preferences | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2085 | Oracle CRM Technical Foundation | Preferences | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2092 | Oracle CRM Technical Foundation | Preferences | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2099 | Oracle CRM Technical Foundation | Preferences | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.2.3-12.2.10 | |
CVE-2021-2105 | Oracle Customer Interaction History | Outcome-Result | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2106 | Oracle Customer Interaction History | Outcome-Result | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2107 | Oracle Customer Interaction History | Outcome-Result | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2090 | Oracle Email Center | Message Display | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2098 | Oracle Email Center | Message Display | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2089 | Oracle iStore | Runtime Catalog | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2077 | Oracle iStore | Shopping Cart | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2082 | Oracle iStore | Shopping Cart | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2096 | Oracle iStore | Shopping Cart | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2097 | Oracle iSupport | Profile | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2083 | Oracle iSupport | User Responsibilities | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2026 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2027 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2118 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2094 | Oracle One-to-One Fulfillment | Print Server | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2091 | Oracle Scripting | Miscellaneous | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2015 | Oracle Workflow | Worklist | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.2.3-12.2.10 | |
CVE-2021-2115 | Oracle Common Applications Calendar | Tasks | HTTP | No | 7.6 | Network | Low | Low | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2059 | Oracle iStore | Web interface | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2023 | Oracle Installed Base | APIs | HTTP | Yes | 4.7 | Network | Low | None | Required | Changed | None | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.9 | |
CVE-2021-2017 | Oracle User Management | Proxy User Delegation | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 12.1.3, 12.2.3-12.2.10 |
This Critical Patch Update contains 8 new security patches for Oracle Enterprise Manager. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the January 2021 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update January 2021 Patch Availability Document for Oracle Products, My Oracle Support Note 2725756.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-13990 | Enterprise Manager Base Platform | Connector Framework (Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.2.1.0 | |
CVE-2020-11973 | Enterprise Manager Base Platform | Reporting Framework (Apache Camel) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.3.0.0, 13.4.0.0 | |
CVE-2016-1000031 | Enterprise Manager Base Platform | Reporting Framework (Apache Commons FileUpload) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.3.0.0, 13.4.0.0 | |
CVE-2020-11984 | Enterprise Manager Ops Center | Control Proxy (Apache HTTP Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.4.0.0 | |
CVE-2020-10683 | Oracle Application Testing Suite | Load Testing for Web Apps (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.3.0.1 | |
CVE-2018-15756 | Enterprise Manager for Fusion Applications | Topology Viewer (Spring Framework) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 13.3.0.0 | |
CVE-2020-11022 | Oracle Application Testing Suite | Load Testing for Web Apps (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 13.3.0.1 | |
CVE-2015-4000 | Enterprise Manager Ops Center | User Interface (OpenSSL) | HTTPS | Yes | 3.7 | Network | High | None | None | Un- changed |
None | Low | None | 12.4.0.0 |
This Critical Patch Update contains 50 new security patches for Oracle Financial Services Applications. 41 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-11612 | Oracle Banking Corporate Lending Process Management | Core (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2020-11612 | Oracle Banking Credit Facilities Process Management | Core (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-10744 | Oracle Banking Extensibility Workbench | Core (Lodash) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.3.0, 14.4.0 | |
CVE-2020-8174 | Oracle Banking Extensibility Workbench | Core (Node.js) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.3.0, 14.4.0 | |
CVE-2020-11612 | Oracle Banking Liquidity Management | Common (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.0.0-14.4.0 | |
CVE-2020-11612 | Oracle Banking Payments | Payments Core (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.4.0 | |
CVE-2020-11612 | Oracle Banking Supply Chain Finance | Core (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.2.0-14.4.0 | |
CVE-2020-11612 | Oracle Banking Trade Finance Process Management | Dashboard (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2020-11612 | Oracle Banking Virtual Account Management | Common Core (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-3773 | Oracle Financial Services Analytical Applications Infrastructure | Infrastructure (Spring Web Services) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.6-8.1.0 | |
CVE-2019-0230 | Oracle Financial Services Data Integration Hub | User Interface (Apache Struts) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.3, 8.0.6 | |
CVE-2019-0230 | Oracle Financial Services Market Risk Measurement and Management | User Interface (Apache Struts) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.6 | |
CVE-2020-11612 | Oracle FLEXCUBE Universal Banking | Infrastructure (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.4.0 | |
CVE-2020-1945 | Oracle Banking Liquidity Management | Common (Apache Ant) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 14.0.0-14.4.0 | |
CVE-2020-27216 | Oracle FLEXCUBE Core Banking | Securities (Eclipse Jetty) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 11.5.0-11.9.0 | |
CVE-2019-12399 | Oracle Banking Corporate Lending Process Management | Core (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-12399 | Oracle Banking Credit Facilities Process Management | Core (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-12399 | Oracle Banking Liquidity Management | Common (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.0.0-14.4.0 | |
CVE-2019-12399 | Oracle Banking Payments | Payments Core (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.4.0 | |
CVE-2020-11979 | Oracle Banking Platform | Installer (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 2.4.0, 2.4.1, 2.6.2, 2.7.0, 2.7.1, 2.8.0 | |
CVE-2019-12402 | Oracle Banking Platform | Party, Financials (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 2.6.2, 2.7.0, 2.8.0, 2.9.0 | |
CVE-2019-12399 | Oracle Banking Platform | Product Manufacturing (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 2.7.0 | |
CVE-2019-12399 | Oracle Banking Supply Chain Finance | Core (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.2.0-14.4.0 | |
CVE-2019-12399 | Oracle Banking Trade Finance Process Management | Dashboard (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-12399 | Oracle Banking Virtual Account Management | Common Core (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2020-11979 | Oracle Financial Services Analytical Applications Infrastructure | Infrastructure (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 8.0.6-8.1.0 | |
CVE-2019-12399 | Oracle Financial Services Analytical Applications Infrastructure | Infrastructure (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.6-8.1.0 | |
CVE-2019-12399 | Oracle FLEXCUBE Universal Banking | Infrastructure (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 14.4.0 | |
CVE-2019-10086 | Oracle Financial Services Analytical Applications Infrastructure | Infrastructure (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.0.6-8.1.0 | |
CVE-2019-10086 | Oracle Financial Services Asset Liability Management | Core (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.0.7, 8.1.0 | |
CVE-2019-10086 | Oracle Financial Services Funds Transfer Pricing | Core (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.0.6, 8.0.7, 8.1.0 | |
CVE-2019-10086 | Oracle Financial Services Market Risk Measurement and Management | Core (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.0.6 | |
CVE-2019-10086 | Oracle Financial Services Profitability Management | Core (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.0.6, 8.0.7, 8.1.0 | |
CVE-2019-10086 | Oracle Insurance Allocation Manager for Enterprise Profitability | Core (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.1.0 | |
CVE-2020-5408 | Oracle Banking Corporate Lending Process Management | Core (Spring Security) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2020-5408 | Oracle Banking Credit Facilities Process Management | Core (Spring Security) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2020-5408 | Oracle Banking Liquidity Management | Common (Spring Security) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 14.0.0-14.4.0 | |
CVE-2020-5408 | Oracle Banking Supply Chain Finance | Core (Spring Security) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 14.2.0-14.4.0 | |
CVE-2020-5408 | Oracle Banking Trade Finance Process Management | Dashboard (Spring Security) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2020-5408 | Oracle Banking Virtual Account Management | Common Core (Spring Security) | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2020-5421 | Oracle Financial Services Analytical Applications Infrastructure | Infrastructure (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 8.0.6-8.1.0 | |
CVE-2019-11269 | Oracle Banking Corporate Lending Process Management | Core (Spring Security Oauth) | HTTP | Yes | 5.4 | Network | Low | None | Required | Un- changed |
Low | Low | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-11269 | Oracle Banking Credit Facilities Process Management | Core (Spring Security Oauth) | HTTP | Yes | 5.4 | Network | Low | None | Required | Un- changed |
Low | Low | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-11269 | Oracle Banking Liquidity Management | Common (Spring Security Oauth) | HTTP | Yes | 5.4 | Network | Low | None | Required | Un- changed |
Low | Low | None | 14.0.0-14.4.0 | |
CVE-2019-11269 | Oracle Banking Payments | Payments Core (Spring Security Oauth) | HTTP | Yes | 5.4 | Network | Low | None | Required | Un- changed |
Low | Low | None | 14.4.0 | |
CVE-2019-11269 | Oracle Banking Supply Chain Finance | Core (Spring Security Oauth) | HTTP | Yes | 5.4 | Network | Low | None | Required | Un- changed |
Low | Low | None | 14.2.0-14.4.0 | |
CVE-2019-11269 | Oracle Banking Trade Finance Process Management | Dashboard (Spring Security Oauth) | HTTP | Yes | 5.4 | Network | Low | None | Required | Un- changed |
Low | Low | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-11269 | Oracle Banking Virtual Account Management | Common Core (Spring Security Oauth) | HTTP | Yes | 5.4 | Network | Low | None | Required | Un- changed |
Low | Low | None | 14.1.0, 14.3.0, 14.4.0 | |
CVE-2019-11269 | Oracle FLEXCUBE Universal Banking | Infrastructure (Spring Security Oauth) | HTTP | Yes | 5.4 | Network | Low | None | Required | Un- changed |
Low | Low | None | 14.4.0 | |
CVE-2021-2113 | Oracle Financial Services Revenue Management and Billing | On Demand Billing | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
None | Low | None | 2.9.0.0, 2.9.0.1 |
This Critical Patch Update contains 2 new security patches for Oracle Food and Beverage Applications. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2018-1285 | Oracle Hospitality Simphony | Simphony Server (Apache log4net) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 18.2.7.2, 19.1.3 | |
CVE-2021-1997 | Oracle Hospitality Reporting and Analytics | Report | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 9.1.0 |
This Critical Patch Update contains 60 new security patches plus additional third party patches noted below for Oracle Fusion Middleware. 47 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Please note that the Security Alert patches for Oracle WebLogic Server: CVE-2020-14750 are included in this Critical Patch Update. Customers are strongly advised to apply this Critical Patch Update.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-10173 | Oracle BAM (Business Activity Monitoring) | General (Xstream) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.1.9.0, 12.2.1.3.0 | |
CVE-2020-10683 | Oracle Business Process Management Suite | Installer (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-14756 | Oracle Coherence | Core Components | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2015-8965 | Oracle Data Integrator | Install, config, upgrade (Rogue Wave JViews) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-10683 | Oracle Data Integrator | Runtime Java agent for ODI (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2016-1000031 | Oracle Enterprise Data Quality | General (Apache Commons FileUpload) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.1.9.0 | |
CVE-2020-10683 | Oracle Enterprise Data Quality | General (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.1.9.0, 12.2.1.3.0 | |
CVE-2020-11998 | Oracle Enterprise Repository | Security Subsystem (Apache ActiveMQ) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.1.7.0 | |
CVE-2020-10683 | Oracle WebCenter Portal | Portlet Services (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.1.9.0 | |
CVE-2019-17195 | Oracle WebLogic Server | Core Components (Connect2id Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-1994 | Oracle WebLogic Server | Web Services | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0 | |
CVE-2021-2047 | Oracle WebLogic Server | Core Components | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 | |
CVE-2021-2064 | Oracle WebLogic Server | Core Components | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.1.3.0.0 | |
CVE-2021-2108 | Oracle WebLogic Server | Core Components | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.1.3.0.0 | |
CVE-2021-2075 | Oracle WebLogic Server | Samples | IIOP, T3 | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-1945 | Oracle Real-Time Decision Server | Decision Studio (Apache Ant) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 3.2.1.0 | |
CVE-2020-5421 | Oracle Endeca Information Discovery Integrator | Integrator ETL (Spring Framework) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 3.2.0.0 | |
CVE-2021-2066 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | High | Low | 8.5.4, 8.5.5 | See Note 1 |
CVE-2021-2067 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | High | Low | 8.5.4, 8.5.5 | See Note 1 |
CVE-2021-2068 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | High | Low | 8.5.4, 8.5.5 | See Note 1 |
CVE-2021-2069 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | High | Low | 8.5.4, 8.5.5 | See Note 1 |
CVE-2021-2025 | Oracle Business Intelligence Enterprise Edition | Analytics Web General | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2041 | Oracle Business Intelligence Enterprise Edition | Installation | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2049 | Oracle BI Publisher | Administration | HTTP | No | 7.6 | Network | Low | Low | None | Un- changed |
High | Low | Low | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2013 | Oracle BI Publisher | BI Publisher Security | HTTP | No | 7.6 | Network | Low | Low | None | Un- changed |
High | Low | Low | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2050 | Oracle BI Publisher | E-Business Suite - XDO | HTTP | No | 7.6 | Network | Low | Low | None | Un- changed |
High | Low | Low | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2051 | Oracle BI Publisher | E-Business Suite - XDO | HTTP | No | 7.6 | Network | Low | Low | None | Un- changed |
High | Low | Low | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2062 | Oracle BI Publisher | Web Server | HTTP | No | 7.6 | Network | Low | Low | Required | Changed | High | Low | None | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-17359 | Oracle Data Integrator | Runtime Java agent for ODI (Bouncy Castle Java Library) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.4.0 | |
CVE-2017-12626 | Oracle Enterprise Data Quality | General (Apache POI) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11.1.1.9.0, 12.2.1.3.0 | |
CVE-2020-11979 | Oracle Enterprise Repository | Security Subsystem (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 11.1.1.7.0 | |
CVE-2019-17566 | Oracle Enterprise Repository | Security Subsystem (Apache Batik) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 11.1.1.7.0 | |
CVE-2020-11994 | Oracle Enterprise Repository | Security Subsystem (Apache Camel) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 11.1.1.7.0 | |
CVE-2020-13935 | Oracle Managed File Transfer | MFT Runtime Server (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-0227 | Oracle Real-Time Decision Server | Platform Installation (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 3.2.1.0 | |
CVE-2019-10086 | Oracle Data Integrator | Install, config, upgrade (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-10086 | Oracle Endeca Information Discovery Integrator | Integrator ETL (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 3.2.0.0 | |
CVE-2019-10086 | Oracle Fusion Middleware MapViewer | Install (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 12.2.1.3.0 | |
CVE-2019-10086 | Oracle Real-Time Decision Server | Platform Installation (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 3.2.1.0 | |
CVE-2019-10086 | Oracle WebCenter Portal | Security Framework (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-10086 | Oracle WebLogic Server | Console (Apache Commons Beanutils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2109 | Oracle WebLogic Server | Console | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2018-2587 | Oracle Adaptive Access Manager | Install and Config | HTTP | Yes | 6.5 | Network | High | None | None | Un- changed |
Low | High | None | 11.1.2.3.0 | |
CVE-2018-9019 | Oracle Data Integrator | Rest Service (Dolibarr) | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-5421 | Oracle GoldenGate Application Adapters | Application Adapters (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 19.1.0.0.0 | |
CVE-2020-5421 | Oracle WebLogic Server | Sample apps (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-1995 | Oracle WebLogic Server | Web Services | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
None | High | None | 10.3.6.0.0, 12.1.3.0.0 | |
CVE-2019-14862 | Oracle Business Intelligence Enterprise Edition | Analytics Server (Knockout) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 5.5.0.0.0 | |
CVE-2019-17091 | Oracle Enterprise Data Quality | General (Eclipse Mojarra) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0 | |
CVE-2020-11022 | Oracle WebCenter Sites | WebCenter Sites (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-11022 | Oracle WebLogic Server | Sample apps (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2016-5725 | Oracle Data Integrator | Install, config, upgrade (JCraft JSch) | SFTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 11.1.1.9.0, 12.2.1.3.0 | |
CVE-2018-10237 | Oracle WebLogic Server | Centralized Thirdparty Jars (Google Guava) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 12.2.1.3.0 | |
CVE-2021-2003 | Business Intelligence Enterprise Edition | Analytics Web Dashboards | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-10247 | Oracle Data Integrator | Centralized Thirdparty Jars (Eclipse Jetty) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2005 | Oracle Business Intelligence Enterprise Edition | BI Platform Security | HTTP | Yes | 4.7 | Network | Low | None | Required | Changed | Low | None | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2033 | Oracle WebLogic Server | Core Components | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-9488 | Oracle Data Integrator | Install, config, upgrade (Apache Log4j) | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-9488 | Oracle GoldenGate Application Adapters | Application Adapters (Apache Log4j) | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 19.1.0.0.0 | |
CVE-2021-1996 | Oracle WebLogic Server | Web Services | HTTP | No | 2.4 | Network | Low | High | Required | Un- changed |
Low | None | None | 10.3.6.0.0, 12.1.3.0.0 |
This Critical Patch Update contains 2 new security patches for Oracle GraalVM. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-8277 | Oracle GraalVM Enterprise Edition | Node (Node.js) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 19.3.4, 20.3.0 | |
CVE-2020-14803 | Oracle GraalVM Enterprise Edition | Java | Multiple | Yes | 5.3 | Network | High | None | Required | Un- changed |
None | High | None | 19.3.4, 20.3.0 |
This Critical Patch Update contains 5 new security patches for Oracle Health Sciences Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-10683 | Oracle Health Sciences Information Manager | Recordlocator, DSUB (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 3.0.1 | |
CVE-2020-5421 | Oracle Healthcare Master Person Index | MDM Module (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 4.0.2.5 | |
CVE-2021-2040 | Oracle Argus Safety | Case Form, Local Affiliate Form | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.2.2 | |
CVE-2021-2110 | Oracle Argus Safety | Letters | HTTP | No | 5.0 | Network | Low | Low | None | Changed | Low | None | None | 8.2.2 | |
CVE-2020-9488 | Oracle Health Sciences Information Manager | Recordlocator, DSUB (Apache Log4j) | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 3.0.1 |
This Critical Patch Update contains 7 new security patches for Oracle Hyperion. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-13990 | Hyperion Infrastructure Technology | Common Security (Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.2.4 | |
CVE-2020-11984 | Hyperion Infrastructure Technology | Installation and Configuration (Apache HTTP Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.2.4 | |
CVE-2019-17563 | Hyperion Infrastructure Technology | Common Security (Apache Tomcat) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 11.1.2.4 | See Note 1 |
CVE-2019-12402 | Hyperion Infrastructure Technology | Installation and Configuration (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11.1.2.4 | |
CVE-2020-5421 | Hyperion Infrastructure Technology | Installation and Configuration (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 11.1.2.4 | |
CVE-2020-11022 | Hyperion Financial Reporting | Installation (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 11.1.2.4 | See Note 2 |
CVE-2019-12415 | Hyperion Infrastructure Technology | Common Security (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 11.1.2.4 |
This Critical Patch Update contains 3 new security patches for Oracle Insurance Applications. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-5421 | Oracle Insurance Policy Administration | Architecture (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 10.2.0, 10.2.4, 11.0.2, 11.1.0-11.3.0 | |
CVE-2020-5421 | Oracle Insurance Rules Palette | Architecture (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 10.2.0, 10.2.4, 11.0.2, 11.1.0-11.3.0 | |
CVE-2019-11358 | Oracle Insurance Insbridge Rating and Underwriting | Framework Administrator IBFA (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 5.0.0.20, 5.1.1.03 |
This Critical Patch Update contains 1 new security patch for Oracle Java SE. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-14803 | Java SE, Java SE Embedded | Libraries | Multiple | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | Java SE: 7u281, 8u271; Java SE Embedded: 8u271 | See Note 1 |
This Critical Patch Update contains 5 new security patches for Oracle JD Edwards. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-1967 | JD Edwards EnterpriseOne Tools | Enterprise Infrastructure SEC (OpenSSL) | JDENET | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | Prior to 9.2.5.0 | |
CVE-2020-11022 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator Security (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 9.2.5.0 | |
CVE-2020-11022 | JD Edwards EnterpriseOne Tools | E1 Dev Platform Tech - Cloud (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 9.2.5.0 | |
CVE-2020-11022 | JD Edwards EnterpriseOne Tools | Web Runtime (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 9.2.5.0 | |
CVE-2021-2052 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator Security | HTTP | Yes | 5.8 | Network | Low | None | None | Changed | Low | None | None | Prior to 9.2.5.1 |
This Critical Patch Update contains 43 new security patches for Oracle MySQL. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-13871 | MySQL Workbench | Workbench (SQLite) | MySQL Workbench | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2019-10086 | MySQL Enterprise Monitor | Service Manager (Apache Commons BeanUtils) | HTTPS | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 8.0.22 and prior | |
CVE-2021-2046 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 6.8 | Network | Low | High | None | Changed | None | None | High | 8.0.22 and prior | |
CVE-2020-5421 | MySQL Enterprise Monitor | Service Manager (Spring Framework) | HTTPS | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 8.0.22 and prior | |
CVE-2020-5408 | MySQL Enterprise Monitor | Service Manager (Spring Security) | HTTPS | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 8.0.22 and prior | |
CVE-2021-2020 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.20 and prior | |
CVE-2021-2024 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 6.5 | Network | Low | Low | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2011 | MySQL Client | C API | MySQL Protocol | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 5.7.32 and prior, 8.0.22 and prior | |
CVE-2020-1971 | MySQL Workbench | MySQL Workbench (OpenSSL) | MySQL Workbench | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2006 | MySQL Client | C API | MySQL Protocol | No | 5.3 | Network | High | Low | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2021-2048 | MySQL Server | InnoDB | MySQL Protocol | No | 5.0 | Network | High | High | None | Un- changed |
None | Low | High | 8.0.22 and prior | |
CVE-2021-2028 | MySQL Server | InnoDB | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.21 and prior | |
CVE-2021-2122 | MySQL Server | Server: DDL | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2058 | MySQL Server | Server: Locking | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2001 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.6.50 and prior, 5.7.30 and prior, 8.0.17 and prior | |
CVE-2021-2016 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2021-2021 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2030 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.21 and prior | |
CVE-2021-2031 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2036 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2055 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.21 and prior | |
CVE-2021-2060 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.6.50 and prior, 5.7.32 and prior, 8.0.22 and prior | |
CVE-2021-2070 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2076 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2065 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2014 | MySQL Server | Server: PAM Auth Plugin | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.7.32 and prior | |
CVE-2021-2002 | MySQL Server | Server: Replication | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2012 | MySQL Server | Server: Security: Privileges | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.20 and prior | |
CVE-2021-2009 | MySQL Server | Server: Security: Roles | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.19 and prior | |
CVE-2021-2072 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2081 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2022 | MySQL Server | InnoDB | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 5.6.50 and prior, 5.7.32 and prior, 8.0.22 and prior | |
CVE-2021-2038 | MySQL Server | Server: Components Services | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2061 | MySQL Server | Server: DDL | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2056 | MySQL Server | Server: DML | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2087 | MySQL Server | Server: DML | MySQL Protocol | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2088 | MySQL Server | Server: DML | MySQL Protocol | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | 8.0.22 and prior | |
CVE-2021-2032 | MySQL Server | Information Schema | MySQL Protocol | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 5.7.32 and prior, 8.0.22 and prior | |
CVE-2021-2010 | MySQL Client | C API | MySQL Protocol | No | 4.2 | Network | High | Low | None | Un- changed |
None | Low | Low | 5.6.50 and prior, 5.7.32 and prior, 8.0.22 and prior | |
CVE-2021-1998 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 3.8 | Network | Low | High | None | Un- changed |
None | Low | Low | 8.0.20 and prior | |
CVE-2021-2007 | MySQL Client | C API | MySQL Protocol | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior | |
CVE-2021-2019 | MySQL Server | Server: Security: Privileges | MySQL Protocol | No | 2.7 | Network | Low | High | None | Un- changed |
Low | None | None | 8.0.19 and prior | |
CVE-2021-2042 | MySQL Server | InnoDB | MySQL Protocol | No | 2.3 | Local | Low | High | None | Un- changed |
Low | None | None | 8.0.21 and prior |
This Critical Patch Update contains 8 new security patches for Oracle PeopleSoft. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2063 | PeopleSoft Enterprise PeopleTools | Portal | None | No | 8.4 | Local | Low | None | None | Un- changed |
High | High | High | 8.56, 8.57, 8.58 | |
CVE-2021-2071 | PeopleSoft Enterprise PeopleTools | Elastic Search | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 8.56, 8.57, 8.58 | |
CVE-2019-0227 | PeopleSoft Enterprise HCM Human Resources | Global Payroll for Switzerland (Apache Axis) | HTTP | Yes | 7.5 | Adjacent Network |
High | None | None | Un- changed |
High | High | High | 9.2 | |
CVE-2021-2044 | PeopleSoft Enterprise FIN Payables | Financial Sanctions | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.2 | |
CVE-2020-11022 | PeopleSoft Enterprise HCM Human Resources | Company Dir / Org Chart Viewer, Employee Snapshot (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.2 | |
CVE-2021-2043 | PeopleSoft Enterprise PeopleTools | Portal | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.56, 8.57, 8.58 | |
CVE-2020-9281 | PeopleSoft Enterprise PeopleTools | Rich Text Editor (CKEditor) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.56, 8.57, 8.58 | |
CVE-2020-1968 | PeopleSoft Enterprise PeopleTools | Security (OpenSSL) | HTTPS | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 8.56, 8.57, 8.58 |
This Critical Patch Update contains 32 new security patches for Oracle Retail Applications. 20 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-10683 | Oracle Retail Customer Management and Segmentation Foundation | Segment (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 16.0, 17.0, 18.0, 19.0 | |
CVE-2020-9546 | Oracle Retail Merchandising System | Foundation (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 15.0 | |
CVE-2020-9546 | Oracle Retail Sales Audit | Rule Wizards (jackson-databind) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.1 | |
CVE-2020-1945 | Oracle Retail Extract Transform and Load | Mathematical Operators (Apache Ant) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 13.2.5, 13.2.8 | |
CVE-2020-5421 | Oracle Retail Order Broker | System Administration (Spring Framework) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 15.0, 16.0 | |
CVE-2017-8028 | Oracle Retail Invoice Matching | Posting (Spring-LDAP) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 13.2, 14.0, 14.1 | |
CVE-2020-5398 | Oracle Retail Bulk Data Integration | BDI Job Scheduler (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 16.0.3 | |
CVE-2020-11979 | Oracle Retail Financial Integration | PeopleSoft Integration (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2020-11979 | Oracle Retail Integration Bus | RIB Kernal (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2019-17566 | Oracle Retail Integration Bus | RIB Kernal (Apache Batik) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 15.0.3 | |
CVE-2019-17566 | Oracle Retail Order Broker | System Administration (Apache Batik) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 15.0, 16.0 | |
CVE-2020-11979 | Oracle Retail Service Backbone | RSB kernel (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2020-11979 | Oracle Retail Store Inventory Management | SIM Integration (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.1.3.9, 15.0.3.0, 16.0.3.0 | |
CVE-2019-10086 | Oracle Retail Financial Integration | PeopleSoft Integration (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2019-10086 | Oracle Retail Integration Bus | RIB Kernal (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2019-10086 | Oracle Retail Order Broker | System Administration (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 15.0 | |
CVE-2019-10086 | Oracle Retail Service Backbone | RSB kernel (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2020-9484 | Oracle Retail Order Broker | System Administration (Apache Tomcat) | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | 15.0 | |
CVE-2020-5421 | Oracle Retail Assortment Planning | Application Core (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 16.0.3 | |
CVE-2020-5421 | Oracle Retail Financial Integration | PeopleSoft Integration (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | High | Low | None | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2020-5421 | Oracle Retail Integration Bus | RIB Kernal (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | High | Low | None | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2020-5421 | Oracle Retail Invoice Matching | Security (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | High | Low | None | 14.0, 14.1 | |
CVE-2020-5421 | Oracle Retail Service Backbone | RSB kernel (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | High | Low | None | 14.1.3, 15.0.3, 16.0.3 | |
CVE-2021-2057 | Oracle Retail Customer Management and Segmentation Foundation | Internal Operations | HTTP | No | 6.3 | Network | Low | Low | None | Un- changed |
Low | Low | Low | 19.0 | |
CVE-2019-17091 | Oracle Retail Bulk Data Integration | BDI Job Scheduler (Eclipse Mojarra) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 16.0.3 | |
CVE-2020-13954 | Oracle Retail Order Broker Cloud Service | Supplier Direct Fulfillment (Apache CXF) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 15.0 | |
CVE-2019-17091 | Oracle Retail Store Inventory Management | SIM Integration (Eclipse Mojarra) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 14.0.4.0, 14.1.3.0, 15.0.3.0, 16.0.3.0 | |
CVE-2020-17521 | Oracle Retail Bulk Data Integration | BDI Job Scheduler (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 15.0.3, 16.0.3 | |
CVE-2020-17521 | Oracle Retail Financial Integration | PeopleSoft Integration Bugs (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 15.0.3, 16.0.3 | |
CVE-2020-17521 | Oracle Retail Integration Bus | RIB Kernal (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 15.0.3, 16.0.3 | |
CVE-2020-17521 | Oracle Retail Service Backbone | RSB kernel (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 15.0.3, 16.0.3 | |
CVE-2020-9488 | Oracle Retail Customer Management and Segmentation Foundation | Promotions (Apache Log4j) | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 16.0, 17.0, 18.0, 19.0 |
This Critical Patch Update contains 4 new security patches for Oracle Siebel CRM. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2039 | Siebel Core - Server Framework | Search | HTTP | No | 7.6 | Network | Low | Low | Required | Changed | High | Low | None | 20.12 and prior | |
CVE-2020-9484 | Siebel UI Framework | EAI (Apache Tomcat) | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | 20.12 and prior | |
CVE-2020-11022 | Siebel Mobile App | Open UI (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 20.12 and prior | |
CVE-2021-2004 | Siebel Core - Server BizLogic Script | Integration - Scripting | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 20.12 and prior |
This Critical Patch Update contains 11 new security patches for Oracle Supply Chain. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2102 | Oracle Complex Maintenance, Repair, and Overhaul | Dialog Box | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 11.5.10, 12.1, 12.2 | |
CVE-2021-2103 | Oracle Complex Maintenance, Repair, and Overhaul | Dialog Box | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 11.5.10, 12.1, 12.2 | |
CVE-2021-2104 | Oracle Complex Maintenance, Repair, and Overhaul | Dialog Box | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 11.5.10, 12.1, 12.2 | |
CVE-2021-2078 | Oracle Configurator | UI Servlet | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1, 12.2 | |
CVE-2021-2079 | Oracle Configurator | UI Servlet | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1, 12.2 | |
CVE-2021-2080 | Oracle Configurator | UI Servlet | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1, 12.2 | |
CVE-2020-14195 | Oracle Agile PLM | Security (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 9.3.6 | |
CVE-2019-17563 | Oracle Agile Engineering Data Management | Install (Apache Tomcat) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 6.2.1.0 | |
CVE-2020-9281 | Oracle Agile PLM | Security (CKEditor) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.3.5, 9.3.6 | |
CVE-2019-11358 | Oracle Agile Product Lifecycle Management for Process | Installation (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 6.1 | |
CVE-2019-11358 | Oracle Transportation Management | Install (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 1.4.3 |
This Critical Patch Update contains 4 new security patches for Oracle Systems. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-11984 | Oracle ZFS Storage Appliance Kit | Operating System Image | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.8 | |
CVE-2020-11022 | StorageTek Tape Analytics SW Tool | Software (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 2.3.1 | |
CVE-2021-1999 | Oracle ZFS Storage Appliance Kit | RAS subsystems | None | No | 5.0 | Local | High | High | Required | Changed | None | High | None | 8.8 | |
CVE-2020-9488 | StorageTek Tape Analytics SW Tool | Software (Apache Log4j) | HTTP | Yes | 3.7 | Network | High | None | None | Un- changed |
Low | None | None | 2.3.1 |
This Critical Patch Update contains 1 new security patch for Oracle Utilities Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-2555 | Oracle Utilities Framework | General (Oracle Coherence) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0 |
This Critical Patch Update contains 17 new security patches for Oracle Virtualization. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2074 | Oracle VM VirtualBox | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | Prior to 6.1.18 | |
CVE-2021-2129 | Oracle VM VirtualBox | Core | None | No | 7.9 | Local | Low | High | None | Changed | High | High | None | Prior to 6.1.18 | |
CVE-2021-2128 | Oracle VM VirtualBox | Core | None | No | 6.5 | Local | Low | Low | None | Changed | High | None | None | Prior to 6.1.18 | |
CVE-2021-2086 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | None | None | High | Prior to 6.1.18 | |
CVE-2021-2111 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | None | None | High | Prior to 6.1.18 | |
CVE-2021-2112 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | None | None | High | Prior to 6.1.18 | |
CVE-2021-2121 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | None | None | High | Prior to 6.1.18 | |
CVE-2021-2124 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | None | None | High | Prior to 6.1.18 | |
CVE-2021-2119 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | High | None | None | Prior to 6.1.18 | |
CVE-2021-2120 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | High | None | None | Prior to 6.1.18 | |
CVE-2021-2126 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | None | High | None | Prior to 6.1.18 | |
CVE-2021-2131 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | None | High | None | Prior to 6.1.18 | |
CVE-2021-2125 | Oracle VM VirtualBox | Core | None | No | 4.6 | Local | Low | High | None | Changed | Low | Low | None | Prior to 6.1.18 | |
CVE-2021-2073 | Oracle VM VirtualBox | Core | None | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | Prior to 6.1.18 | |
CVE-2021-2127 | Oracle VM VirtualBox | Core | None | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | Prior to 6.1.18 | |
CVE-2021-2130 | Oracle VM VirtualBox | Core | None | No | 4.4 | Local | Low | High | None | Un- changed |
None | None | High | Prior to 6.1.18 | |
CVE-2021-2123 | Oracle VM VirtualBox | Core | None | No | 3.2 | Local | Low | High | None | Changed | Low | None | None | Prior to 6.1.18 |