A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 342 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at July 2021 Critical Patch Update: Executive Summary and Analysis.
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.
Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:
Date | Note |
---|---|
2021-September-03 | Rev 7. Removed additional CVEs of the patch for CVE-2019-17195 |
2021-August-18 | Rev 6. Updated CVSS scores for Outside In Technology |
2021-July-30 | Rev 5. Updated affected version for Oracle Communications Services Gatekeeper |
2021-July-26 | Rev 4. Removed Oracle JDeveloper version 12.2.1.3.0, updated Credit Statement |
2021-July-23 | Rev 3. Removed Oracle JDeveloper and ADF entry from the product table. Updated Credit Statement. |
2021-July-21 | Rev 2. Updated Credit Statement, Oracle BI Publisher affected versions updated, MOS note numbers updated |
2021-July-20 | Rev 1. Initial Release. |
This Critical Patch Update contains 27 new security patches for Oracle Database Products divided as follows:
This Critical Patch Update contains 16 new security patches plus additional third party patches noted below for Oracle Database Products. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. 1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
CVE# | Component | Package and/or Privilege Required | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2351 | Advanced Networking Option | None | Oracle Net | Yes | 8.3 | Network | High | None | Required | Changed | High | High | High | 12.1.0.2, 12.2.0.1, 19c | See Note 1 |
CVE-2021-2328 | Oracle Text | Create Any Procedure, Alter Any Table | Oracle Net | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2021-2329 | Oracle XML DB | Create Any Procedure, Create Public Synonym | Oracle Net | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2021-2337 | Oracle XML DB | Create Any Procedure, Create Public Synonym | Oracle Net | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2020-27193 | Oracle Application Express (CKEditor) | Valid User Account | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | Prior to 21.1.0.00.01 | |
CVE-2020-26870 | Oracle Application Express Application Builder (DOMPurify) | Valid User Account | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | Prior to 21.1.0.00.01 | |
CVE-2021-2460 | Oracle Application Express Data Reporter | Valid User Account | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | Prior to 21.1.0.00.04 | |
CVE-2021-2333 | Oracle XML DB | Alter User | Oracle Net | No | 4.9 | Network | Low | High | None | Un- changed |
High | None | None | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2019-17545 | Oracle Spatial and Graph (GDAL) | Create Session | Oracle Net | No | 4.4 | Local | High | Low | Required | Un- changed |
None | None | High | 12.2.0.1, 19c | |
CVE-2021-2330 | Core RDBMS | Create Table | Oracle Net | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 19c | |
CVE-2020-7760 | Enterprise Manager Express User Interface (CodeMirror) | User Account | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 19c | |
CVE-2021-2438 | Java VM | Create Procedure | Oracle Net | No | 4.3 | Network | Low | Low | None | Un- changed |
None | None | Low | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2021-2334 | Oracle Database - Enterprise Edition Data Redaction | Create Session | Oracle Net | No | 3.5 | Network | Low | Low | Required | Un- changed |
None | Low | None | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2021-2335 | Oracle Database - Enterprise Edition Data Redaction | Create Session | Oracle Net | No | 3.5 | Network | Low | Low | Required | Un- changed |
None | Low | None | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2021-2336 | Oracle Database - Enterprise Edition Data Redaction | Create Session | Oracle Net | No | 3.5 | Network | Low | Low | Required | Un- changed |
None | Low | None | 12.1.0.2, 12.2.0.1, 19c | |
CVE-2021-2326 | Database Vault | DBA | Oracle Net | No | 2.7 | Network | Low | High | None | Un- changed |
Low | None | None | 12.2.0.1, 19c |
This Critical Patch Update contains 2 new security patches plus additional third party patches noted below for Oracle Big Data Graph. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-5064 | Big Data Spatial and Graph | Big Data Graph (OpenCV) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | Prior to 2.0 | |
CVE-2020-17527 | Big Data Spatial and Graph | Big Data Graph (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | Prior to 23.1 |
This Critical Patch Update contains 9 new security patches for Oracle Essbase. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2244 | Essbase Analytic Provider Services | JAPI | HTTP | Yes | 10.0 | Network | Low | None | None | Changed | High | High | High | 21.2 | |
CVE-2021-2349 | Hyperion Essbase Administration Services | EAS Console | HTTP | Yes | 8.6 | Network | Low | None | None | Changed | High | None | None | 11.1.2.4, 21.2 | |
CVE-2021-2435 | Essbase Analytic Provider Services | JAPI | HTTP | Yes | 8.1 | Network | Low | None | Required | Un- changed |
High | High | None | 11.1.2.4 | |
CVE-2019-0190 | Essbase | Infrastructure (OpenSSL) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 21.2 | |
CVE-2020-8285 | Essbase | Infrastructure (cURL) | Multiple | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 21.2 | |
CVE-2021-2433 | Essbase Analytic Provider Services | Web Services | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 11.1.2.4, 21.2 | |
CVE-2021-2350 | Hyperion Essbase Administration Services | EAS Console | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 11.1.2.4, 21.2 | |
CVE-2020-7760 | Essbase | Infrastructure (CodeMirror) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | None | Low | 21.2 | |
CVE-2019-12402 | Essbase | Infrastructure (Apache Commons Compress) | HTTP | No | 4.1 | Adjacent Network |
Low | Low | Required | Un- changed |
None | Low | Low | 21.2 |
This Critical Patch Update contains 11 new security patches for Oracle Commerce. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2463 | Oracle Commerce Platform | Dynamo Application Framework | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.0.0, 11.1.0, 11.2.0, 11.3.0-11.3.2 | |
CVE-2020-2555 | Oracle Commerce Platform | Dynamo Application Framework (Coherence) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.0.0, 11.1.0, 11.2.0, 11.3.0-11.3.2 | |
CVE-2020-2604 | Oracle Commerce Guided Search | Content Acquisition System (Java SE) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 11.3.2 | |
CVE-2021-20190 | Oracle Commerce Guided Search / Oracle Commerce Experience Manager | Experience Manage (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 11.3.2 | |
CVE-2020-2604 | Oracle Commerce Guided Search / Oracle Commerce Experience Manager | Tools and Frameworks (Java SE) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 11.3.2 | |
CVE-2020-25649 | Oracle Commerce Platform | Dynamo Application Framework (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 11.2.0, 11.3.0-11.3.2 | |
CVE-2021-26272 | Oracle Commerce Merchandising | Experience Manager, Business Control Center (CKEditor) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 11.1.0, 11.2.0, 11.3.0-11.3.2 | |
CVE-2021-2462 | Oracle Commerce Service Center | Commerce Service Center | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 11.0.0, 11.1.0, 11.2.0, 11.3.0-11.3.2 | |
CVE-2021-2345 | Oracle Commerce Guided Search / Oracle Commerce Experience Manager | Tools and Frameworks | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 11.3.1.5 | |
CVE-2021-2346 | Oracle Commerce Guided Search / Oracle Commerce Experience Manager | Tools and Frameworks | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 11.3.1.5 | |
CVE-2021-2348 | Oracle Commerce Guided Search / Oracle Commerce Experience Manager | Tools and Frameworks | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 11.3.1.5 |
This Critical Patch Update contains 33 new security patches for Oracle Communications Applications. 22 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-21345 | Oracle Communications BRM - Elastic Charging Engine | CN ECE (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 12.0.0.3.0 | |
CVE-2021-21345 | Oracle Communications Unified Inventory Management | Drools Ruleset (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 7.3.2, 7.3.4, 7.3.5, 7.4.0, 7.4.1 | |
CVE-2020-11612 | Oracle Communications BRM - Elastic Charging Engine | HTTP GW (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0.0.3.0 | |
CVE-2021-3177 | Oracle Communications Offline Mediation Controller | UDC CORE (Python) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0.0.3.0 | |
CVE-2020-17530 | Oracle Communications Pricing Design Center | CNE (Apache Struts) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0.0.3.0 | |
CVE-2019-17195 | Oracle Communications Pricing Design Center | CNE (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0.0.3.0 | |
CVE-2021-22112 | Oracle Communications Unified Inventory Management | REST API (Spring Security) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 7.4.1 | |
CVE-2020-10878 | Oracle Communications Offline Mediation Controller | UDC CORE (Perl) | TCP/IP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 12.0.0.3.0 | |
CVE-2020-10878 | Oracle Communications Pricing Design Center | Transformation for PDC (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 12.0.0.3.0 | |
CVE-2020-14195 | Oracle Communications Instant Messaging Server | Managing Messages (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 10.0.1.4.0 | |
CVE-2021-3345 | Oracle Communications Billing and Revenue Management | Accounts Receivable (libgcrypt) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 12.0.0.3.0 | |
CVE-2020-27216 | Oracle Communications Offline Mediation Controller | CN OCOMC (Eclipse Jetty) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 12.0.0.3.0 | |
CVE-2020-27216 | Oracle Communications Pricing Design Center | Transformation for PDC (Eclipse Jetty) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 12.0.0.3.0 | |
CVE-2020-8286 | Oracle Communications Billing and Revenue Management | Balances (cURL) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.0.0.3.0 | |
CVE-2020-25649 | Oracle Communications Billing and Revenue Management | Business Operation Center (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 7.5.0.23.0, 12.0.0.3.0 | |
CVE-2020-25649 | Oracle Communications Convergent Charging Controller | Common fns (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.0.4.0.0 | |
CVE-2020-25649 | Oracle Communications Network Charging and Control | OUI (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.0.4.0.0 | |
CVE-2019-17566 | Oracle Communications Offline Mediation Controller | CN OCOMC (Apache Batik) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.0.0.3.0 | |
CVE-2020-28196 | Oracle Communications Offline Mediation Controller | NM Core (Kerberos) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.0.0.3.0 | |
CVE-2020-5258 | Oracle Communications Pricing Design Center | Server for PDC (dojo) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.0.0.3.0 | |
CVE-2020-17527 | Oracle Communications Pricing Design Center | Transformation for PDC (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.0.0.3.0 | |
CVE-2020-28196 | Oracle Communications Pricing Design Center | Transformation for PDC (Kerberos) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.0.0.3.0 | |
CVE-2020-25648 | Oracle Communications Pricing Design Center | CNE (NSS) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.0.0.3.0 | |
CVE-2020-25649 | Oracle Communications Unified Inventory Management | Media Resource (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 7.4.1 | |
CVE-2020-8203 | Oracle Communications Billing and Revenue Management | Billing Care (Lodash) | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
None | High | High | 7.5.0.23.0, 12.0.0.3.0 | |
CVE-2019-10086 | Oracle Communications Pricing Design Center | Transformation for PDC (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 12.0.0.3.0 | |
CVE-2020-9484 | Oracle Communications Instant Messaging Server | Managing Messages (Apache Tomcat) | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | 10.0.1.4.0 | |
CVE-2020-7017 | Oracle Communications Billing and Revenue Management | Balance Monitoring Manager (Kibana) | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed |
High | High | Low | 12.0.0.3.0 | |
CVE-2019-3740 | Oracle Communications Unified Inventory Management | Inventory Organizer (BSAFE Crypto-J) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 7.3.2, 7.3.4, 7.3.5, 7.4.0, 7.4.1 | |
CVE-2020-17521 | Oracle Communications BRM - Elastic Charging Engine | Elastic charging controller (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 11.3.0.9.0, 12.0.0.3.0 | |
CVE-2021-21290 | Oracle Communications Design Studio | Modeling (Netty) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 7.4.2 | |
CVE-2021-20227 | Oracle Communications Network Charging and Control | Common fns (SQLite) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
None | None | High | 6.0.1.0, 12.0.1.0-12.0.4.0 | |
CVE-2020-11987 | Oracle Communications Offline Mediation Controller | UDC CORE (Apache Batik) | TCP/IP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.0.0.3.0 |
This Critical Patch Update contains 26 new security patches for Oracle Communications. 23 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-17195 | Oracle Communications Cloud Native Core Security Edge Protection Proxy | Configuration (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 1.7.0 | |
CVE-2020-11612 | Oracle Communications Cloud Native Core Service Communication Proxy | KPI (Netty) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 1.5.2 | |
CVE-2020-11998 | Oracle Communications Diameter Signaling Router (DSR) | Provisioning (Apache ActiveMQ) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.0.0-8.5.0 | |
CVE-2019-12260 | Oracle Communications EAGLE Software | Measurements (VxWorks) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 46.6.0-46.8.2 | |
CVE-2020-10878 | Oracle SD-WAN Aware | Monitoring (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 8.2, 9.0 | |
CVE-2020-10543 | Oracle SD-WAN Edge | Publications (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 8.2, 9.0, 9.1 | |
CVE-2020-27216 | Oracle Communications Services Gatekeeper | Call Control Common Service (Eclipse Jetty) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 7.0 | |
CVE-2020-5258 | Oracle Communications Application Session Controller | Signaling (dojo) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 3.9 | |
CVE-2019-10746 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | Configuration (Kibana) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 1.4.0 | |
CVE-2020-7733 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | Signaling (Kibana) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 1.7.0 | |
CVE-2017-9735 | Oracle Communications Cloud Native Core Policy | Configuration (Jetty) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 1.5.0 | |
CVE-2020-5398 | Oracle Communications Cloud Native Core Policy | Configuration (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 1.5.0 | |
CVE-2019-12399 | Oracle Communications Cloud Native Core Policy | Measurements (Apache Kafka) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 1.9.0 | |
CVE-2020-25649 | Oracle Communications Cloud Native Core Unified Data Repository | UDR (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 1.4.0 | |
CVE-2020-25649 | Oracle Communications Evolved Communications Application Server | Session Design Center GUI (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 7.1 | |
CVE-2020-25649 | Oracle Communications Services Gatekeeper | OCSG Policy service (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 7.0 | |
CVE-2019-10086 | Oracle Communications Cloud Native Core Console | Signaling (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 1.4.0 | |
CVE-2019-10086 | Oracle Communications Cloud Native Core Policy | Measurements (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 1.9.0 | |
CVE-2019-10086 | Oracle Communications Cloud Native Core Unified Data Repository | Measurements (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 1.6.0 | |
CVE-2019-10086 | Oracle Communications Evolved Communications Application Server | Managing and Using Subscriber Data (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 7.1 | |
CVE-2018-15686 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment | Signaling (Calico) | None | No | 6.3 | Local | High | High | Required | Un- changed |
High | High | High | 1.4.0 | |
CVE-2020-24553 | Oracle Communications Cloud Native Core Policy | Signaling (Go) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 1.5.0 | |
CVE-2020-17521 | Oracle Communications Evolved Communications Application Server | Control Engine (Apache Groovy) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 7.1 | |
CVE-2020-29582 | Oracle Communications Cloud Native Core Network Slice Selection Function | Signaling (Calico) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 1.2.1 | |
CVE-2020-27218 | Oracle Communications Services Gatekeeper | Subscriber profile (Eclipse Jetty) | HTTP | Yes | 4.8 | Network | High | None | None | Un- changed |
None | Low | Low | 7.0 | |
CVE-2016-0762 | Oracle Communications Diameter Signaling Router (DSR) | Provisioning (Apache Tomcat) | HTTP | Yes | 4.3 | Network | Low | None | Required | Un- changed |
None | Low | None | 8.0.0-8.5.0 |
This Critical Patch Update contains 10 new security patches for Oracle Construction and Engineering. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-17195 | Primavera Gateway | Admin (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 18.8.0-18.8.11 | |
CVE-2021-25122 | Instantis EnterpriseTrack | HTTP Server (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 17.1, 17.2, 17.3 | |
CVE-2020-25649 | Primavera Gateway | Admin (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 17.12.0-17.12.11, 18.8.0-18.8.11, 19.12.0-19.12.10, 20.12.0 | |
CVE-2020-8203 | Primavera Gateway | Admin (Lodash) | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
None | High | High | 17.12.0-17.12.11, 18.8.0-18.8.11, 19.12.0-19.12.10, 20.12.0 | |
CVE-2021-2366 | Primavera P6 Enterprise Project Portfolio Management | Web Access | HTTP | No | 6.4 | Network | Low | Low | None | Changed | Low | Low | None | 17.12.0-17.12.20, 18.8.0-18.8.23, 19.12.0-19.12.14, 20.12.0-20.12.3 | |
CVE-2021-21409 | Primavera Gateway | Admin (Netty) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
None | High | None | 17.12.0-17.12.11, 18.8.0-18.8.11, 19.12.0-19.12.10 | |
CVE-2021-27906 | Primavera Unifier | Core (Apache PDFbox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2021-2386 | Primavera P6 Enterprise Project Portfolio Management | Web Access | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 20.12.0-20.12.3 | |
CVE-2020-5258 | Primavera Unifier | Core UI (dojo) | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
None | Low | None | 17.7-17.12, 18.8, 19.12, 20.12 | |
CVE-2020-25649 | Primavera Unifier | Project Delivery (jackson-databind) | None | No | 3.9 | Local | Low | Low | Required | Un- changed |
Low | Low | None | 17.7-17.12, 18.8, 19.12, 20.12 |
This Critical Patch Update contains 17 new security patches for Oracle E-Business Suite. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the July 2021 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (July 2021), My Oracle Support Note 2770321.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2355 | Oracle Marketing | Marketing Administration | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2436 | Oracle Common Applications | CRM User Management Framework | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2359 | Oracle Marketing | Marketing Administration | HTTP | Yes | 8.2 | Network | Low | None | Required | Changed | High | Low | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2361 | Oracle Advanced Inbound Telephony | SDK client integration | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2398 | Oracle Advanced Outbound Telephony | Region Mapping | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2360 | Oracle Approvals Management | AME Page rendering | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-2406 | Oracle Collaborative Planning | User Interface | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-2393 | Oracle E-Records | E-signatures | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2405 | Oracle Engineering | Change Management | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.2.3-12.2.10 | |
CVE-2021-2362 | Oracle Field Service | Wireless | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-2365 | Oracle Human Resources | People Management | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-2364 | Oracle iSupplier Portal | Accounts | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2363 | Oracle Public Sector Financials (International) | Authorization | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3 | |
CVE-2021-2415 | Oracle Time and Labor | Timecard | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.1-12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2434 | Oracle Web Applications Desktop Integrator | Application Service | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2380 | Oracle Applications Framework | Attachments / File Upload | HTTP | No | 7.6 | Network | Low | Low | Required | Changed | High | Low | None | 12.1.3, 12.2.3-12.2.10 | |
CVE-2021-2343 | Oracle Workflow | Workflow Notification Mailer | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 12.1.3, 12.2.3-12.2.10 |
This Critical Patch Update contains 8 new security patches for Oracle Enterprise Manager. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the July 2021 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2021 Patch Availability Document for Oracle Products, My Oracle Support Note 2773670.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-10683 | Enterprise Manager Base Platform | Application Service Level Mgmt (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 13.4.0.0 | |
CVE-2019-5064 | Enterprise Manager Base Platform | Application Service Level Mgmt (OpenCV) | HTTP | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 13.4.0.0 | |
CVE-2020-10878 | Oracle Configuration Manager | Content Server (Perl) | HTTP | Yes | 8.6 | Network | Low | None | None | Un- changed |
Low | Low | High | 12.1.2.0.8 | |
CVE-2020-1971 | Enterprise Manager Base Platform | Discovery Framework (OpenSSL) | HTTPS | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 13.4.0.0 | |
CVE-2019-2897 | Enterprise Manager Base Platform | Enterprise Config Management | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 13.4.0.0 | |
CVE-2019-2897 | Enterprise Manager Base Platform | System Monitoring | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 13.4.0.0 | |
CVE-2019-10086 | Oracle Application Testing Suite | Load Testing for Web Apps (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 13.3.0.1 | |
CVE-2017-14735 | Enterprise Manager Base Platform | UI Framework (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 13.4.0.0 |
This Critical Patch Update contains 22 new security patches for Oracle Financial Services Applications. 17 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-21345 | Oracle Banking Enterprise Default Management | Collections (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 2.10.0, 2.12.0 | |
CVE-2021-21345 | Oracle Banking Platform | Collections (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 2.4.0, 2.7.1, 2.9.0, 2.12.0 | |
CVE-2019-0228 | Oracle Banking Liquidity Management | Onboarding (Apache PDFbox) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 14.2, 14.3, 14.5 | |
CVE-2021-26117 | Oracle FLEXCUBE Private Banking | Financial Planning (Apache ActiveMQ) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0.0, 12.1.0 | |
CVE-2020-5413 | Oracle FLEXCUBE Private Banking | Financial Planning (Spring Integration) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0.0, 12.1.0 | |
CVE-2020-11998 | Oracle FLEXCUBE Private Banking | Financial Planning (Apache ActiveMQ) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.0.0, 12.1.0 | |
CVE-2020-27218 | Oracle FLEXCUBE Private Banking | Financial Planning (Eclipse Jetty) | HTTP | Yes | 9.4 | Network | Low | None | None | Un- changed |
High | High | Low | 12.0.0, 12.1.0 | |
CVE-2020-24750 | Oracle Banking Liquidity Management | Onboarding (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 14.2,14.3, 14.5 | |
CVE-2020-25649 | Oracle Banking Treasury Management | Accounting (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.4 | |
CVE-2020-11979 | Oracle Banking Treasury Management | Capital Workflow (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.4 | |
CVE-2020-11979 | Oracle Financial Services Analytical Applications Infrastructure | Rate Management (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 8.0.6-8.0.9, 8.1.0, 8.1.1 | |
CVE-2020-11979 | Oracle FLEXCUBE Private Banking | Order Management (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 12.0.0, 12.1.0 | |
CVE-2020-8203 | Oracle Banking Liquidity Management | DashBoard (Lodash) | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
None | High | High | 14.2,14.3, 14.5 | |
CVE-2019-10086 | Oracle Financial Services Revenue Management and Billing Analytics | Dashboards (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 2.7.0, 2.8.0 | |
CVE-2020-7712 | Oracle Financial Services Regulatory Reporting with AgileREPORTER | Reports (Apache ZooKeeper) | HTTP | No | 7.2 | Network | Low | High | None | Un- changed |
High | High | High | 8.0.9.6.3 | |
CVE-2020-27193 | Oracle Banking Party Management | Web UI (CKEditor) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 2.7.0 | |
CVE-2020-27193 | Oracle Financial Services Analytical Applications Infrastructure | Rate Management (CKEditor) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.0.6-8.0.9, 8.1.0, 8.1.1 | |
CVE-2020-11022 | Oracle Financial Services Revenue Management and Billing Analytics | Dashboards (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 2.7.0, 2.8.0 | |
CVE-2021-2323 | Oracle FLEXCUBE Universal Banking | Flex-Branch | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | 12.3,12.4, 14.0-14.4, | |
CVE-2020-11987 | Oracle FLEXCUBE Universal Banking | General Ledger (Apache Batik) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 14.1.0-14.4.0 | |
CVE-2021-2324 | Oracle FLEXCUBE Universal Banking | Loans And Deposits | HTTP | No | 4.6 | Network | Low | Low | Required | Un- changed |
Low | Low | None | 12.0-12.4, 14.0-14.4, | |
CVE-2021-2448 | Oracle Financial Services Crime and Compliance Investigation Hub | Reports | None | No | 3.7 | Local | High | High | Required | Changed | Low | Low | None | 20.1.2 |
This Critical Patch Update contains 6 new security patches for Oracle Food and Beverage Applications. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2395 | Oracle Hospitality Reporting and Analytics | iCare, Configuration | HTTP | No | 8.1 | Network | Low | Low | None | Un- changed |
High | High | None | 9.1.0 | |
CVE-2021-3156 | MICROS Compact Workstation 3 | Workstation 310 (Sudo) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 310 | |
CVE-2021-3156 | MICROS ES400 Series | Express Station 4 (Sudo) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 400-410 | |
CVE-2021-3156 | MICROS Kitchen Display System Hardware | Kitchen Display System 210 (Sudo) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 210 | |
CVE-2021-3156 | MICROS Workstation 5A | Workstation 5A (Sudo) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 5A | |
CVE-2021-3156 | MICROS Workstation 6 | Workstation 6 (Sudo) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 610-655 |
This Critical Patch Update contains 48 new security patches for Oracle Fusion Middleware. 35 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update July 2021 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2021 Patch Availability Document for Oracle Products, My Oracle Support Note 2773670.1.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-21345 | Oracle BAM (Business Activity Monitoring) | General (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-21345 | Oracle WebCenter Portal | Security Framework (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2456 | Oracle Business Intelligence Enterprise Edition | Analytics Web General | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.4.0 | |
CVE-2019-17195 | Oracle Data Integrator | Runtime Java agent for ODI (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.4.0 | |
CVE-2020-10683 | Oracle JDeveloper | Oracle JDeveloper (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.1.4.0 | |
CVE-2020-28052 | Oracle WebCenter Portal | Security Framework (Bouncy Castle Java Library) | HTTPS | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2394 | Oracle WebLogic Server | Core | T3, IIOP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-2397 | Oracle WebLogic Server | Core | T3, IIOP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-2382 | Oracle WebLogic Server | Security | T3, IIOP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-2392 | Oracle BI Publisher | BI Publisher Security | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2396 | Oracle BI Publisher | E-Business Suite - XDO | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2391 | Oracle BI Publisher | Scheduler | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-5421 | Oracle Enterprise Data Quality | General (Spring Framework) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2428 | Oracle Coherence | Core | T3, IIOP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-2458 | Identity Manager | Identity Console | HTTP | No | 7.6 | Network | Low | Low | Required | Changed | High | Low | None | 11.1.2.2.0, 11.1.2.3.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2400 | Oracle BI Publisher | E-Business Suite - XDO | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2371 | Oracle Coherence | Core | T3, IIOP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-2344 | Oracle Coherence | Core | T3, IIOP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2020-25649 | Oracle GoldenGate Application Adapters | Application Adapters (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 19.1.0.0.0 | |
CVE-2019-12402 | Oracle JDeveloper | Oracle JDeveloper (Apache Commons Compress) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 12.2.1.4.0 | |
CVE-2021-25122 | Oracle Managed File Transfer | MFT Runtime Server (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2021-2378 | Oracle WebLogic Server | Core | T3, IIOP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-2376 | Oracle WebLogic Server | Web Services | T3, IIOP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2015-0254 | Oracle WebLogic Server | Third Party Tools (Apache Standard Taglibs) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 10.3.6.0.0, 12.1.3.0.0 | |
CVE-2019-10086 | Real-Time Decisions (RTD) Solutions | WLS Deployment Template for RT (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 3.2.0.0 | |
CVE-2021-2450 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2451 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2419 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2420 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2423 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2449 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2452 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2430 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2431 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2021-2453 | Oracle Outside In Technology | Outside In Filters | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 8.5.5 | See Note 1 |
CVE-2020-1945 | Oracle Data Integrator | Install, config, upgrade (Apache Ant) | None | No | 6.3 | Local | High | Low | None | Un- changed |
High | High | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2019-11358 | Identity Manager | UI Platform (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 12.2.1.3.0 | |
CVE-2019-12415 | Oracle JDeveloper | OAM (Apache POI) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 12.2.1.4.0 | |
CVE-2021-27906 | Oracle Outside In Technology | Outside In Clean Content SDK (Apache PDFBox) | None | No | 5.5 | Local | Low | None | Required | Un- changed |
None | None | High | 8.5.5 | |
CVE-2021-2457 | Identity Manager | Request Management & Workflow | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 11.1.2.3.0 | |
CVE-2021-2401 | Oracle BI Publisher | E-Business Suite - XDO | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-13956 | Oracle Data Integrator | Install, config, upgrade (Apache HttpClient) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-11987 | Oracle Enterprise Repository | Security Subsystem - 12c (Apache Batik) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 11.1.1.7.0 | |
CVE-2020-11987 | Oracle Fusion Middleware MapViewer | Install (Apache Batik) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 12.2.1.4.0 | |
CVE-2021-2403 | Oracle WebLogic Server | Core | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 | |
CVE-2021-2358 | Oracle Access Manager | Rest interfaces for Access Mgr | HTTPS | No | 4.9 | Network | Low | High | None | Un- changed |
High | None | None | 11.1.2.3.0 | |
CVE-2020-8908 | Oracle Data Integrator | Install, config, upgrade (Guava) | None | No | 3.3 | Local | Low | Low | None | Un- changed |
Low | None | None | 12.2.1.3.0, 12.2.1.4.0 | |
CVE-2020-2555 | Oracle Access Manager | Installation Component (Oracle Coherence) | HTTPS | No | 3.1 | Adjacent Network |
High | High | None | Un- changed |
Low | Low | None | 11.1.2.3.0 |
This Critical Patch Update contains 1 new security patch for Oracle Hospitality Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-21290 | Oracle Hospitality Suite8 | Spa and Leisure (Netty) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 8.13, 8.14 |
This Critical Patch Update contains 6 new security patches for Oracle Hyperion. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-2729 | Hyperion Infrastructure Technology | Installation and Configuration (Oracle WebLogic Server) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 11.1.2.4, 11.2.5.0 | |
CVE-2019-17566 | Hyperion Financial Reporting | Installation (Apache Batik) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 11.1.2.4, 11.2.5.0 | |
CVE-2017-14735 | Hyperion Infrastructure Technology | Common Security (AntiSamy) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 11.1.2.4, 11.2.5.0 | |
CVE-2021-2445 | Hyperion Infrastructure Technology | Lifecycle Management | HTTP | No | 5.7 | Network | High | High | Required | Un- changed |
High | High | None | 11.2.5.0 | |
CVE-2021-2347 | Hyperion Infrastructure Technology | Lifecycle Management | HTTP | No | 5.2 | Network | Low | High | Required | Un- changed |
High | Low | None | 11.2.5.0 | |
CVE-2021-2439 | Oracle Hyperion BI+ | UI and Visualization | HTTP | Yes | 4.3 | Network | Low | None | Required | Un- changed |
Low | None | None | 11.1.2.4, 11.2.5.0 |
This Critical Patch Update contains 4 new security patches for Oracle Insurance Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-22112 | Oracle Insurance Policy Administration | Architecture (Spring Security) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 11.2.0, 11.3.0 | |
CVE-2020-35490 | Oracle Insurance Policy Administration J2EE | Security Information (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 11.0.2 | |
CVE-2020-25649 | Oracle Insurance Policy Administration | Architecture (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 11.0.2, 11.1.0-11.3.0 | |
CVE-2020-25649 | Oracle Insurance Rules Palette | Architecture (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 11.0.2, 11.1.0-11.3.0 |
This Critical Patch Update contains 6 new security patches for Oracle Java SE. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-29921 | Oracle GraalVM Enterprise Edition | Python interpreter and runtime (CPython) | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | Oracle GraalVM Enterprise Edition: 20.3.2, 21.1.0 | |
CVE-2021-2388 | Java SE, Oracle GraalVM Enterprise Edition | Hotspot | Multiple | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2, 21.1.0 | See Note 1 |
CVE-2020-28928 | Oracle GraalVM Enterprise Edition | LLVM Interpreter (musl libc) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
None | None | High | Oracle GraalVM Enterprise Edition: 20.3.2, 21.1.0 | |
CVE-2021-2369 | Java SE, Oracle GraalVM Enterprise Edition | Library | Multiple | Yes | 4.3 | Network | Low | None | Required | Un- changed |
None | Low | None | Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2, 21.1.0 | See Note 1 |
CVE-2021-2432 | Java SE | JNDI | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | Java SE: 7u301 | See Note 2 |
CVE-2021-2341 | Java SE, Oracle GraalVM Enterprise Edition | Networking | Multiple | Yes | 3.1 | Network | High | None | Required | Un- changed |
Low | None | None | Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2, 21.1.0 | See Note 1 |
This Critical Patch Update contains 9 new security patches for Oracle JD Edwards. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-13990 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator Security (Quartz) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 9.2.5.3 and Prior | |
CVE-2019-17195 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator Security (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 9.2.5.3 and prior | |
CVE-2019-17195 | JD Edwards EnterpriseOne Tools | Business Logic Inf SEC (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 9.2.5.3 and prior | |
CVE-2019-17195 | JD Edwards EnterpriseOne Tools | Web Runtime SEC (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 9.2.5.3 and prior | |
CVE-2020-25649 | JD Edwards EnterpriseOne Orchestrator | E1 IOT Orchestrator Security (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 9.2.5.3 and prior | |
CVE-2020-25649 | JD Edwards EnterpriseOne Tools | Monitoring and Diagnostics SEC (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 9.2.5.3 and prior | |
CVE-2020-25649 | JD Edwards EnterpriseOne Tools | Web Runtime SEC (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 9.2.5.3 and prior | |
CVE-2021-2375 | JD Edwards EnterpriseOne Tools | Web Runtime | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 9.2.5.3 and prior | |
CVE-2021-2373 | JD Edwards EnterpriseOne Tools | Web Runtime | HTTP | No | 5.4 | Network | Low | Low | Required | Changed | Low | Low | None | 9.2.5.3 and Prior |
This Critical Patch Update contains 41 new security patches for Oracle MySQL. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-22884 | MySQL Cluster | Cluster: JS module (Node.js) | Multiple | Yes | 8.8 | Network | Low | None | Required | Un- changed |
High | High | High | 8.0.25 and prior | |
CVE-2021-22901 | MySQL Server | Server: Packaging (curl) | Multiple | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 5.7.34 and prior, 8.0.25 and prior | |
CVE-2021-25122 | MySQL Enterprise Monitor | Monitoring: General (Apache Tomcat) | HTTPS/2 | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 8.0.23 and prior | |
CVE-2019-17543 | MySQL Server | Server: Compiling (LZ4) | MySQL Protocol | No | 7.5 | Network | High | Low | None | Un- changed |
High | High | High | 5.7.34 and prior, 8.0.25 and prior | |
CVE-2021-3450 | MySQL Connectors | Connector/C++ (OpenSSL) | MySQL Protocol | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 8.0.23 and prior | |
CVE-2021-3450 | MySQL Connectors | Connector/ODBC (OpenSSL) | MySQL Protocol | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 8.0.23 and prior | |
CVE-2021-3450 | MySQL Enterprise Monitor | Monitoring: General (OpenSSL) | HTTPS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 8.0.23 and prior | |
CVE-2021-2417 | MySQL Server | Server: GIS | MySQL Protocol | No | 6.0 | Network | Low | High | None | Un- changed |
Low | Low | High | 8.0.25 and prior | |
CVE-2021-2389 | MySQL Server | InnoDB | MySQL Protocol | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 5.7.34 and prior, 8.0.25 and prior | |
CVE-2021-2390 | MySQL Server | InnoDB | MySQL Protocol | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 5.7.34 and prior, 8.0.25 and prior | |
CVE-2021-2429 | MySQL Server | InnoDB | MySQL Protocol | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2356 | MySQL Server | Server: Replication | MySQL Protocol | No | 5.9 | Network | High | Low | None | Un- changed |
None | Low | High | 5.7.34 and prior, 8.0.25 and prior | |
CVE-2021-2385 | MySQL Server | Server: Replication | MySQL Protocol | No | 5.0 | Network | High | High | None | Un- changed |
None | Low | High | 5.7.34 and prior, 8.0.25 and prior | |
CVE-2021-2339 | MySQL Server | Server: DDL | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2352 | MySQL Server | Server: DDL | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2399 | MySQL Server | Server: DDL | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2370 | MySQL Server | Server: DML | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2440 | MySQL Server | Server: DML | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2354 | MySQL Server | Server: Federated | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2402 | MySQL Server | Server: Locking | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2342 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 5.7.34 and prior, 8.0.25 and prior | |
CVE-2021-2357 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2367 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2412 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.21 and prior | |
CVE-2021-2383 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2384 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2387 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2444 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.23 and prior | |
CVE-2021-2410 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2418 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2425 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2426 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2427 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2437 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2441 | MySQL Server | Server: Optimizer | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2422 | MySQL Server | Server: PS | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2424 | MySQL Server | Server: Stored Procedure | MySQL Protocol | No | 4.9 | Network | Low | High | None | Un- changed |
None | None | High | 8.0.25 and prior | |
CVE-2021-2372 | MySQL Server | InnoDB | MySQL Protocol | No | 4.4 | Network | High | High | None | Un- changed |
None | None | High | 5.7.34 and prior, 8.0.25 and prior | |
CVE-2021-2374 | MySQL Server | InnoDB | None | No | 4.1 | Local | High | High | None | Un- changed |
High | None | None | 8.0.25 and prior | |
CVE-2021-2411 | MySQL Cluster | Cluster: JS module | Multiple | Yes | 3.7 | Network | High | None | None | Un- changed |
None | None | Low | 8.0.25 and prior | |
CVE-2021-2340 | MySQL Server | Server: Memcached | MySQL Protocol | No | 2.7 | Network | Low | High | None | Un- changed |
None | None | Low | 8.0.25 and prior |
This Critical Patch Update contains 14 new security patches for Oracle PeopleSoft. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-17195 | PeopleSoft Enterprise PeopleTools | REST Services (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.58, 8.59 | |
CVE-2021-27568 | PeopleSoft Enterprise PeopleTools | REST Services (netplex json-smart-v1) | HTTP | Yes | 9.1 | Network | Low | None | None | Un- changed |
High | None | High | 8.58, 8.59 | |
CVE-2021-22884 | PeopleSoft Enterprise PeopleTools | Elastic Search (Node.js) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 8.58, 8.59 | |
CVE-2021-3450 | PeopleSoft Enterprise PeopleTools | Security (OpenSSL) | TLS | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 8.57, 8.58. 8.59 | |
CVE-2020-7017 | PeopleSoft Enterprise PeopleTools | Elastic Search (Kibana) | HTTP | No | 6.7 | Network | High | Low | Required | Un- changed |
High | High | Low | 8.58 | |
CVE-2021-2421 | PeopleSoft Enterprise CS Campus Community | Integration and Interfaces | HTTP | No | 6.5 | Network | Low | Low | None | Un- changed |
High | None | None | 9.0, 9.2 | |
CVE-2021-2404 | PeopleSoft Enterprise HCM Candidate Gateway | e-mail notification | HTTP | Yes | 6.5 | Network | Low | None | None | Un- changed |
Low | Low | None | 9.2 | |
CVE-2021-2455 | PeopleSoft Enterprise HCM Shared Components | Person Search | HTTP | No | 6.5 | Network | Low | High | None | Un- changed |
High | High | None | 9.2 | |
CVE-2021-2408 | PeopleSoft Enterprise PT PeopleTools | Notification Configuration | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 8.59 | |
CVE-2021-21290 | PeopleSoft Enterprise PeopleTools | Elastic Search (Netty) | None | No | 5.5 | Local | Low | Low | None | Un- changed |
High | None | None | 8.57, 8.58, 8.59 | |
CVE-2021-2407 | PeopleSoft Enterprise PeopleTools | Portal | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
Low | None | None | 8.57, 8.58, 8.59 | |
CVE-2020-13956 | PeopleSoft Enterprise PT PeopleTools | Cloud Manager (Apache HttpClient) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 8.57, 8.58, 8.59 | |
CVE-2021-2377 | PeopleSoft Enterprise PeopleTools | SQR | HTTP | No | 4.3 | Network | Low | Low | None | Un- changed |
Low | None | None | 8.57, 8.58, 8.59 | |
CVE-2020-8908 | PeopleSoft Enterprise PeopleTools | Elastic Search (Google Guava) | None | No | 3.3 | Local | Low | Low | None | Un- changed |
Low | None | None | 8.57, 8.58, 8.59 |
This Critical Patch Update contains 1 new security patch for Oracle Policy Automation. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2019-17195 | Oracle Policy Automation | Hub (Nimbus JOSE+JWT) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 12.2.0-12.2.22 |
This Critical Patch Update contains 23 new security patches for Oracle Retail Applications. 15 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-21345 | Oracle Retail Xstore Point of Service | Xenvironment (XStream) | HTTP | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 16.0.6, 17.0.4, 18.0.3, 19.0.2 | |
CVE-2019-0219 | Oracle Retail Xstore Point of Service | Xenvironment (Apache cordova-plugin-inappbrowser) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 16.0.6, 17.0.4, 18.0.3, 19.0.2 | |
CVE-2020-5421 | Oracle Retail Customer Management and Segmentation Foundation | Promotions (Spring Framework) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 16.0-19.0 | |
CVE-2020-5421 | Oracle Retail Merchandising System | Foundation (Spring Framework) | HTTP | No | 8.8 | Network | Low | Low | None | Un- changed |
High | High | High | 16.0.3 | |
CVE-2021-22118 | Oracle Retail Financial Integration | PeopleSoft Integration Bugs (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 16.0.3.0, 15.0.3.1, 14.1.3.2 | |
CVE-2021-22118 | Oracle Retail Integration Bus | RIB Kernal (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 16.0.3.0, 15.0.3.1, 14.1.3.2 | |
CVE-2021-22118 | Oracle Retail Order Broker | System Administration (Spring Framework) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 16.0 | |
CVE-2020-5398 | Oracle Retail Back Office | Pricing (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 14.1 | |
CVE-2020-5398 | Oracle Retail Central Office | Transaction Tracker (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 14.1 | |
CVE-2020-11979 | Oracle Retail Merchandising System | Procurement (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 14.1.3.2 | |
CVE-2020-5398 | Oracle Retail Point-of-Service | Queue Management (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 14.1 | |
CVE-2020-5398 | Oracle Retail Returns Management | Main Dashboard (Spring Framework) | HTTP | Yes | 7.5 | Network | High | None | Required | Un- changed |
High | High | High | 14.1 | |
CVE-2020-25649 | Oracle Retail Service Backbone | RSB Installation (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 16.0.3.0, 15.0.3.1, 14.1.3.2 | |
CVE-2020-17527 | Oracle Retail Xstore Point of Service | Xenvironment (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
High | None | None | 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1 | |
CVE-2020-8277 | Oracle Retail Xstore Point of Service | Xenvironment (Node.js) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1 | |
CVE-2020-25649 | Oracle Retail Xstore Point of Service | Xenvironment (jackson-databind) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 16.0.6, 17.0.4, 18.0.3, 19.0.2 | |
CVE-2020-25638 | Oracle Retail Customer Management and Segmentation Foundation | Segment (Hibernate) | HTTP | Yes | 7.4 | Network | High | None | None | Un- changed |
High | High | None | 19.0 | |
CVE-2019-10086 | Oracle Retail Merchandising System | Foundation (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 15.0.3.1 | |
CVE-2019-10086 | Oracle Retail Price Management | Manage Allocation (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 14.0, 14.1, 15.0, 16.0 | |
CVE-2020-5421 | Oracle Retail Customer Engagement | Internal Operations (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 16.0-19.0 | |
CVE-2021-27807 | Oracle Retail Customer Management and Segmentation Foundation | Segment (Apache PDFbox) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 19.0 | |
CVE-2020-11987 | Oracle Retail Order Broker | Store Connect (Apache Batik) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 15.0, 16.0 | |
CVE-2020-11987 | Oracle Retail Order Management System Cloud Service | Internal Operations (Apache Batik) | HTTP | Yes | 5.3 | Network | Low | None | None | Un- changed |
None | Low | None | 19.5 |
This Critical Patch Update contains 6 new security patches for Oracle Siebel CRM. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-24750 | Siebel Core - Server Framework | Services (jackson-databind) | HTTP | Yes | 8.1 | Network | High | None | None | Un- changed |
High | High | High | 21.5 and Prior | |
CVE-2020-27216 | Siebel Core - Automation | Test Automation (Eclipse Jetty) | None | No | 7.8 | Local | Low | Low | None | Un- changed |
High | High | High | 21.5 and Prior | |
CVE-2017-5637 | Siebel Core - Server Framework | Cloud Gateway (Zookeeper) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 21.5 and Prior | |
CVE-2021-2338 | Siebel Apps - Marketing | Email Marketing Stand-Alone | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | 21.5 and Prior | |
CVE-2021-2368 | Siebel CRM | Siebel Core - Server Infrastructure | HTTPS | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | 21.5 and Prior | |
CVE-2021-2353 | Siebel Core - Server Framework | Loging | None | No | 4.4 | Local | Low | High | None | Un- changed |
High | None | None | 21.5 and Prior |
This Critical Patch Update contains 5 new security patches for Oracle Supply Chain. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-11979 | Oracle Agile Engineering Data Management | Installation Issues (Apache Ant) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | High | None | 6.2.1.0 | |
CVE-2020-13935 | Oracle Agile Engineering Data Management | Installation Issues (Apache Tomcat) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 6.2.1.0 | |
CVE-2012-0881 | Oracle Transportation Management | UI Infrastructure (Apache Xerces2 Java Parser) | HTTP | Yes | 7.5 | Network | Low | None | None | Un- changed |
None | None | High | 6.4.3 | |
CVE-2021-26272 | Oracle Agile PLM | Security (CKEditor) | HTTP | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | 9.3.5, 9.3.6 | |
CVE-2021-24122 | Oracle Agile PLM | Folders, Files & Attachments (Apache Tomcat) | HTTP | Yes | 5.9 | Network | High | None | None | Un- changed |
High | None | None | 9.3.3, 9.3.6 |
This Critical Patch Update contains 1 new security patch for Oracle Support Tools. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2020-11023 | OSS Support Tools | Diagnostic Assistant (jQuery) | HTTP | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None | Prior to 2.12.41 |
This Critical Patch Update contains 11 new security patches for Oracle Systems. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2017-5461 | Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers | XCP Firmware (NSS) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | Prior to XCP2400, prior to XCP3100 | |
CVE-2017-16931 | Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers | XCP Firmware (libxml2) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | Prior to XCP2400, prior to XCP3100 | |
CVE-2018-7183 | Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers | XCP Firmware (NTP) | NTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | Prior to XCP2400, prior to XCP3100 | |
CVE-2021-3177 | Oracle ZFS Storage Appliance Kit | Operating System Image | Multiple | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 8.8 | |
CVE-2020-10683 | StorageTek Tape Analytics SW Tool | Software (dom4j) | HTTP | Yes | 9.8 | Network | Low | None | None | Un- changed |
High | High | High | 2.3 | |
CVE-2019-10086 | Oracle Solaris Cluster | Application Integration (Apache Commons BeanUtils) | HTTP | Yes | 7.3 | Network | Low | None | None | Un- changed |
Low | Low | Low | 4.4 | |
CVE-2018-0739 | Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers | XCP Firmware (OpenSSL) | TLS | Yes | 6.5 | Network | Low | None | Required | Un- changed |
None | None | High | Prior to XCP2400, prior to XCP3100 | |
CVE-2020-5421 | StorageTek Tape Analytics SW Tool | Software (Spring Framework) | HTTP | No | 6.5 | Network | High | Low | Required | Changed | Low | High | None | 2.3 | |
CVE-2019-3740 | StorageTek Tape Analytics SW Tool | Software (BSAFE Crypto-J) | HTTPS | Yes | 6.5 | Network | Low | None | Required | Un- changed |
High | None | None | 2.3 | |
CVE-2016-4429 | Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers | XCP Firmware (glibc) | Multiple | Yes | 5.9 | Network | High | None | None | Un- changed |
None | None | High | Prior to XCP2400, prior to XCP3100 | |
CVE-2021-2381 | Oracle Solaris | Kernel | None | No | 3.9 | Local | Low | Low | Required | Un- changed |
None | Low | Low | 11 |
This Critical Patch Update contains 6 new security patches for Oracle Virtualization. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE# | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Base Score |
Attack Vector |
Attack Complex |
Privs Req'd |
User Interact |
Scope | Confid- entiality |
Inte- grity |
Avail- ability |
|||||||
CVE-2021-2447 | Oracle Secure Global Desktop | Server | Multiple | No | 9.9 | Network | Low | Low | None | Changed | High | High | High | 5.6 | |
CVE-2021-2446 | Oracle Secure Global Desktop | Client | Multiple | Yes | 9.6 | Network | Low | None | Required | Changed | High | High | High | 5.6 | |
CVE-2021-2409 | Oracle VM VirtualBox | Core | None | No | 8.2 | Local | Low | High | None | Changed | High | High | High | Prior to 6.1.24 | |
CVE-2021-2443 | Oracle VM VirtualBox | Core | None | No | 7.3 | Local | Low | High | None | Changed | Low | Low | High | Prior to 6.1.24 | See Note 1 |
CVE-2021-2454 | Oracle VM VirtualBox | Core | None | No | 7.0 | Local | High | Low | None | Un- changed |
High | High | High | Prior to 6.1.24 | |
CVE-2021-2442 | Oracle VM VirtualBox | Core | None | No | 6.0 | Local | Low | High | None | Changed | None | None | High | Prior to 6.1.24 |