2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-5421" ,
"sourceIdentifier" : "security@pivotal.io" ,
"published" : "2020-09-19T04:15:11.527" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:34:08.303" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter."
} ,
{
"lang" : "es" ,
"value" : "En Spring Framework versiones 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28 y versiones anteriores no compatibles, las protecciones contra ataques RFD del CVE-2015 -5211 puede ser omitidas seg\u00fan el navegador usado mediante el uso de un par\u00e1metro de ruta jsessionid"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.3 ,
"impactScore" : 4.7
}
] ,
"cvssMetricV30" : [
{
2024-04-04 08:46:00 +00:00
"source" : "security@pivotal.io" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 8.7 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.3 ,
"impactScore" : 5.8
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:H/Au:S/C:P/I:P/A:N" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 3.6 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "HIGH" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.3.29" ,
"matchCriteriaId" : "4078B16E-B065-43DD-AEEA-25A508D98E72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.0.0" ,
"versionEndExcluding" : "5.0.19" ,
"matchCriteriaId" : "A4C5BBCD-D85A-4E41-9BBC-8506252A5158"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.1.0" ,
"versionEndExcluding" : "5.1.18" ,
"matchCriteriaId" : "C4B69981-7A64-4367-9FC7-1E90C7B63692"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.2.0" ,
"versionEndExcluding" : "5.2.9" ,
"matchCriteriaId" : "90CE3FDA-C493-4BF5-A098-3D3ECFA82E77"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A3622F5-5976-4BBC-A147-FC8A6431EA79"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_brm:11.3.0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DBE77CD9-D635-4DE2-BD01-6927EEC6F564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_brm:12.0.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E452C793-8E23-47DA-836C-B2D232AE66D4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_design_studio:7.3.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "93BE4838-1144-4A6A-ABDB-F2766E64C91C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B54457C-8305-4F82-BE1E-DBA030A8E676"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_design_studio:7.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C756C62B-E655-4770-8E85-B1995889E416"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.2.1" ,
"versionEndIncluding" : "8.2.2.1" ,
"matchCriteriaId" : "02CD4CBE-8C08-4806-92AC-8D3BF7AB84F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D299528-8EF0-49AF-9BDE-4B6C6B1DA36C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17A91FD9-9F77-42D3-A4D9-48BC7568ADE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E856B4A-6AE7-4317-921A-35B4D2048652"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "36CF85A9-2C29-46E7-961E-8ADD0B5822CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E80555C7-DA1C-472C-9467-19554DCE4476"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.0.6" ,
"versionEndIncluding" : "8.1.0" ,
"matchCriteriaId" : "021014B2-DC51-481C-BCFE-5857EFBDEDDA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6762F207-93C7-4363-B2F9-7A7C6F8AF993"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B74B912-152D-4F38-9FC1-741D6D0B27FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2177A5E9-B260-499E-8D60-920679518425"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6329B1A2-75A8-4909-B4FB-77AC7232B6ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E7BE0590-31BD-4FCD-B50E-A5F86196F99E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:healthcare_master_person_index:4.0.2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A04A51B8-5296-425D-BC35-1B30C4F3F052"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DED59B62-C9BF-4C0E-B351-3884E8441655"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:insurance_policy_administration:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.1.0" ,
"versionEndIncluding" : "11.3.0" ,
"matchCriteriaId" : "1DDB3D8B-1D04-4345-BB27-723186719CBD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:insurance_policy_administration:10.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68017B52-6597-4E32-A38F-634B5635568C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:insurance_policy_administration:10.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "009366BF-8604-4F5C-8F1E-346D8CD62CB3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:insurance_policy_administration:11.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F89EC4B-6D34-40F0-B7C6-C03D03F81C13"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:insurance_rules_palette:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.1.0" ,
"versionEndIncluding" : "11.3.0" ,
"matchCriteriaId" : "5DEAB5CD-4223-4A43-AB9E-486113827A6C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEDF91E2-E7B5-40EE-B71F-C7D59F4021BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A94F93C-5828-4D78-9C48-20AC17E72B8E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F3E25293-CB03-44CE-A8ED-04B3A0487A6A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.0.22" ,
"matchCriteriaId" : "EDC84EC1-DB07-44E7-A08E-669109386208"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "955955B3-95F0-4887-97DC-58FB7A13F257"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.2.0" ,
"versionEndIncluding" : "16.2.11" ,
"matchCriteriaId" : "06CF27F6-ADC1-480C-9D2E-2BD1E7330C32"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.12.0" ,
"versionEndIncluding" : "17.12.9" ,
"matchCriteriaId" : "2D3D3B98-C309-4598-BBCD-AF944A13FDC1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "18.8.0" ,
"versionEndIncluding" : "18.8.10" ,
"matchCriteriaId" : "2F582225-CEBE-4CA7-85A7-2D615830BB4C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "19.12.0" ,
"versionEndIncluding" : "19.12.10" ,
"matchCriteriaId" : "3EF7E2B4-B741-41E9-8EF6-6C415AB9EF54"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.1.0" ,
"versionEndIncluding" : "16.2.20" ,
"matchCriteriaId" : "FEC03747-5347-4A0C-9CF2-6234BBDDC514"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.1.0" ,
"versionEndIncluding" : "17.12.19" ,
"matchCriteriaId" : "081EB2B8-9973-4BE6-BC5B-542C4596E27E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "18.1.0" ,
"versionEndIncluding" : "18.8.21" ,
"matchCriteriaId" : "89D3DA35-029B-4194-92DE-47972D3E81AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "19.12.0" ,
"versionEndIncluding" : "19.12.10" ,
"matchCriteriaId" : "6E1E5E43-703C-49F0-8612-0D91B846FE30"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_assortment_planning:16.0.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CDDD1BFF-9B0D-45DA-86DC-05CF829107FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "360B307A-3D7F-4B38-8248-76CF8318B023"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_customer_engagement:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0" ,
"versionEndIncluding" : "19.0" ,
"matchCriteriaId" : "924E5D1E-FB5B-4B6B-9120-ABED0F80FB90"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "16.0" ,
"versionEndIncluding" : "19.0" ,
"matchCriteriaId" : "B92BB355-DB00-438E-84E5-8EC007009576"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_financial_integration:14.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CADAC4BA-0451-4FFD-9071-087C8568C3C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_financial_integration:15.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17AEB94A-ED0B-4A2F-A03B-DD963E83CE73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B042849-7EF5-4A5F-B6CD-712C0B8735BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_integration_bus:14.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1AFAE16-B69F-410A-8CE3-1CDD998A8433"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_integration_bus:15.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA800332-C6B9-4F05-9FB0-72C1040AAFD4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "822A3C37-86F2-4E91-BE91-2A859F983941"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_invoice_matching:14.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "42227DD8-6671-4B38-9E42-4ACF78F09C97"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_invoice_matching:14.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "69962BD9-A102-4621-9461-018E87261657"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8383028-B719-41FD-9B6A-71F8EB4C5F8D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE8CF045-09BB-4069-BCEC-496D5AE3B780"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "38E74E68-7F19-4EF3-AC00-3C249EAAA39E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_predictive_application_server:14.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F6DA82ED-20FF-4E6D-ACA0-C65F51F4F5C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BDB925C6-2CBC-4D88-B9EA-F246F4F7A206"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_service_backbone:14.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D7FCC976-615C-4DE5-9F50-1B25E9553962"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_service_backbone:15.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "84142490-E2D5-4B1F-A0D2-D2D68B120AFF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEE71EA5-B315-4F1E-BFEE-EC426B562F7E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78D8F551-8DC8-4510-8350-AE6BC64748DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "490B2C44-CECD-4551-B04F-4076D0E053C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEC41EB8-73B4-4BDF-9321-F34EC0BAF9E6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "48EFC111-B01B-4C34-87E4-D6B2C40C0122"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "073FEA23-E46A-4C73-9D29-95CFF4F5A59D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6953CFDB-33C0-4B8E-BBBD-E460A17E8ED3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E55B3AA9-69BE-4136-8C3A-FD0DDCD3FA4B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B40B13B7-68B3-4510-968C-6A730EB46462"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C93CC705-1F8C-4870-99E6-14BF264C3811"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F14A818F-AA16-4438-A3E4-E64C9287AC66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "04BCDC24-4A21-473C-8733-0D9CFB38A752"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9F4754FB-E3EB-454A-AB1A-AE3835C5350C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
}
] ,
"references" : [
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163%40%3Ccommits.ambari.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a%40%3Cissues.ambari.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb%40%3Ccommits.pulsar.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211%40%3Ccommits.pulsar.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5%40%3Cissues.ambari.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865%40%3Cissues.hive.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a%40%3Cdev.ambari.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec%40%3Ccommits.pulsar.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1%40%3Cdev.ambari.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d%40%3Cuser.ignite.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb%40%3Cuser.ignite.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc%40%3Ccommits.pulsar.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d%40%3Cissues.hive.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665%40%3Cissues.hive.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e%40%3Cdev.ranger.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074%40%3Cdev.hive.apache.org%3E" ,
"source" : "security@pivotal.io"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20210513-0009/" ,
"source" : "security@pivotal.io" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://tanzu.vmware.com/security/cve-2020-5421" ,
"source" : "security@pivotal.io" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://www.oracle.com//security-alerts/cpujul2021.html" ,
"source" : "security@pivotal.io" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuApr2021.html" ,
"source" : "security@pivotal.io" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuapr2022.html" ,
"source" : "security@pivotal.io" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpujan2021.html" ,
"source" : "security@pivotal.io" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpujan2022.html" ,
"source" : "security@pivotal.io" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuoct2021.html" ,
"source" : "security@pivotal.io" ,
"tags" : [
"Not Applicable" ,
"Third Party Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163%40%3Ccommits.ambari.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a%40%3Cissues.ambari.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb%40%3Ccommits.pulsar.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211%40%3Ccommits.pulsar.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5%40%3Cissues.ambari.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865%40%3Cissues.hive.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a%40%3Cdev.ambari.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec%40%3Ccommits.pulsar.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1%40%3Cdev.ambari.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d%40%3Cuser.ignite.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb%40%3Cuser.ignite.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc%40%3Ccommits.pulsar.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d%40%3Cissues.hive.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665%40%3Cissues.hive.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e%40%3Cdev.ranger.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074%40%3Cdev.hive.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20210513-0009/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://tanzu.vmware.com/security/cve-2020-5421" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://www.oracle.com//security-alerts/cpujul2021.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuApr2021.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuapr2022.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpujan2021.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpujan2022.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuoct2021.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Not Applicable" ,
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}