gsd-2021-2351
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: "Changes in Native Network Encryption with the July 2021 Critical Patch Update" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2021-2351",
    "description": "Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
    "id": "GSD-2021-2351",
    "references": [
      "https://packetstormsecurity.com/files/cve/CVE-2021-2351"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-2351"
      ],
      "details": "Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
      "id": "GSD-2021-2351",
      "modified": "2023-12-13T01:23:14.879358Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert_us@oracle.com",
        "ID": "CVE-2021-2351",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "WebLogic Server",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "12.2.1.3.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "12.2.1.4.0"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "14.1.1.0.0"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Oracle Corporation"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
          }
        ]
      },
      "impact": {
        "cvss": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option."
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://www.oracle.com/security-alerts/cpujul2021.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpujul2021.html"
          },
          {
            "name": "https://www.oracle.com/security-alerts/cpuoct2021.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          },
          {
            "name": "http://seclists.org/fulldisclosure/2021/Dec/19",
            "refsource": "MISC",
            "url": "http://seclists.org/fulldisclosure/2021/Dec/19"
          },
          {
            "name": "http://seclists.org/fulldisclosure/2021/Dec/20",
            "refsource": "MISC",
            "url": "http://seclists.org/fulldisclosure/2021/Dec/20"
          },
          {
            "name": "https://www.oracle.com/security-alerts/cpujan2022.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
          },
          {
            "name": "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html",
            "refsource": "MISC",
            "url": "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html"
          },
          {
            "name": "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html",
            "refsource": "MISC",
            "url": "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html"
          },
          {
            "name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          {
            "name": "https://www.oracle.com/security-alerts/cpujul2022.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          {
            "name": "https://www.oracle.com/security-alerts/cpujan2023.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpujan2023.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:oracle:advanced_networking_option:12.1.0.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E95885F4-38B5-445A-B084-6B87172F2082",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:advanced_networking_option:12.2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FC810AC7-4185-4E20-AFE8-72A97C2933EA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:advanced_networking_option:19c:*:*:*:*:*:*:*",
                    "matchCriteriaId": "231C1E97-2198-4DD7-8BD1-5FF4DDA14CDA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "80C9DBB8-3D50-4D5D-859A-B022EB7C2E64",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A4AA4B21-1BA9-4ED8-B9EA-558AF8655D24",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9C3F9EE5-FCFC-45B8-9F57-C05D42EE0FF0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:airlines_data_model:12.1.1.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "06480458-3216-4C42-9270-F68A41EEC147",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:airlines_data_model:12.2.0.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "480BF1CB-11D7-4D86-A99E-960F316F2E1B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:application_performance_management:13.4.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F84E5662-0289-4ED5-A112-BC506508216C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:application_performance_management:13.5.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AD312681-73A4-4B21-BDE8-50DED7E3E0CF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A125E817-F974-4509-872C-B71933F42AD1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_analytics:8.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BC3D0C4E-0B40-4ACF-BD9E-104CC1D77521",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_analytics:8.2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E67940FD-3BA7-40A8-8E40-44B37D23E2DE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_analytics:8.2.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EE6EB4DE-33DA-4810-96BD-29C82B433714",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_insight:8.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F7FCB446-49A7-48B9-8808-E72A4E2E48C7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_insight:8.2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9E9B2F53-257E-49E2-83C3-0840BDB4D67C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_insight:8.2.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6CF34B1B-0FC0-4EA6-830D-D2191337D451",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_mart:8.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EA67581B-F8FD-416E-852F-859D642B7405",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_mart:8.2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "32ACEED2-BA43-4EF7-9183-2F01CC277FB1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_mart:8.2.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "18B967BB-2233-4FB2-B10D-9A338E1B4089",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_safety:8.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "09B79608-5D94-45C3-ADF0-B181B92C3014",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_safety:8.2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9F05D844-38BD-4EEB-AF91-E5ED18B1E7E8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:argus_safety:8.2.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "25193811-46CE-4A0E-B22D-67BE99FAD450",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_apis:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6DF2D056-3118-4C31-BEDD-69F016898CBB",
                    "versionEndIncluding": "18.3",
                    "versionStartIncluding": "18.1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_apis:19.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CF34B11F-3DE1-4C22-8EB1-AEE5CE5E4172",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_apis:19.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "86F03B63-F922-45CD-A7D1-326DB0042875",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_apis:20.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7CBFC93F-8B39-45A2-981C-59B187169BD4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_apis:21.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0843465C-F940-4FFC-998D-9A2668B75EA0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_digital_experience:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "366A6277-5D74-44C8-94A9-8ADB5568B5FB",
                    "versionEndIncluding": "18.3",
                    "versionStartIncluding": "18.1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_digital_experience:17.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "560F20E6-AEA1-4CE5-A393-C9B2CF334C5C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "18127694-109C-4E7E-AE79-0BA351849291",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_digital_experience:21.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0D6895A6-511A-4DC6-9F9B-58E05B86BDB1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_enterprise_default_management:2.10.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "74C7E2F1-17FC-4322-A5C3-F7EB612BA4F5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "320D36DA-D99F-4149-B582-3F4AB2F41A1B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "132CE62A-FBFC-4001-81EC-35D81F73AF48",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "645AA3D1-C8B5-4CD2-8ACE-31541FA267F0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:banking_platform:2.12.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BDC6D658-09EA-4C41-869F-1C2EA163F751",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "384DEDD9-CB26-4306-99D8-83068A9B23ED",
                    "versionEndExcluding": "23.1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2ECE8F5F-4417-4412-B857-F1ACDEED4FC2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:clinical:5.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4B2CEA84-0983-4C40-B923-99244ABCF32D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:clinical:5.2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2FD798A8-38B7-42C1-9043-863D16CE7ACA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:commerce_platform:11.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "57DA1DD8-E9F1-43C6-BCA2-1E9C92B1664C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:commerce_platform:11.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "869CDD22-4A6C-4665-AA37-E340B07EF81C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8CDE72F7-ED9D-4A53-BF63-DF6711FFDEF4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_application_session_controller:3.9.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "787E2C1B-9BAD-4018-8495-E9BE75628BB8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B465F237-0271-4389-8035-89C07A52350D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "123CB9B5-C800-47FD-BD0C-BE44198E97E2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.5.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4063FAD6-21D4-42C7-87C0-D299532E0982",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "59275C23-53C0-4890-A941-A71226B50CFB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0172500D-DE51-44E0-91E8-C8F36617C1F8",
                    "versionEndIncluding": "12.0.4.0.0",
                    "versionStartIncluding": "12.0.1.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E99E7D49-AE53-4D16-AB24-EBEAAD084289",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_data_model:11.3.2.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "69C215AB-25B4-47A6-AD6A-A60D2C0FF72F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_data_model:11.3.2.2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8E77E48F-1521-4C89-A5D0-A7F0A8D21AD1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_data_model:11.3.2.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6F88A2F3-E201-4C68-8D11-0A5C76CDB071",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_data_model:12.1.0.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CBD877F8-E6EF-4314-AAC0-36F81F4908DF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_data_model:12.1.2.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3D7356B6-E197-4978-BF18-2CFD4D350A76",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1B54457C-8305-4F82-BE1E-DBA030A8E676",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_design_studio:7.4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C756C62B-E655-4770-8E85-B1995889E416",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_design_studio:7.4.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "93F65B4C-59D5-450A-9955-7FDA32252B0F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A67AA54B-258D-4D09-9ACB-4085E0B3E585",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B5AAD5EB-403D-4DCD-96F6-3871889B9403",
                    "versionEndIncluding": "8.2.3",
                    "versionStartIncluding": "8.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DE7A60DB-A287-4E61-8131-B6314007191B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "64BCB9E3-883D-4C1F-9785-2E182BA47B5B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F28B94B3-D940-4B1C-9E72-F061515D24F2",
                    "versionEndIncluding": "12.0.4.0.0",
                    "versionStartIncluding": "12.0.1.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EB9047B1-DA8C-4BFD-BE41-728BD7ECF3E6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FB92D8A7-2ABD-4B70-A32C-4B6B866C5B8B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B21E6EEF-2AB7-4E96-B092-1F49D11B4175",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D6BDB265-293F-4F27-8CE0-576DF3ECD3BC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "53600579-4542-4D80-A93C-3E45938C749D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "062E4E7C-55BB-46F3-8B61-5A663B565891",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D96CE74A-EB3A-489E-9229-43810DD46F64",
                    "versionEndIncluding": "8.2.5.0",
                    "versionStartIncluding": "8.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EAE0FAB3-DE56-4271-B3F1-FF665F55B728",
                    "versionEndIncluding": "8.2.5",
                    "versionStartIncluding": "8.2.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9901F6BA-78D5-45B8-9409-07FF1C6DDD38",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9FADE563-5AAA-42FF-B43F-35B20A2386C9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:demantra_demand_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "132DE874-6E47-452A-9FDD-27D5A41F046E",
                    "versionEndIncluding": "12.2.11",
                    "versionStartIncluding": "12.2.6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:documaker:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "603C00AA-DBF3-4F62-A74D-8AE596800B4C",
                    "versionEndIncluding": "12.6.4",
                    "versionStartIncluding": "12.6.2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:documaker:12.6.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AE3CF700-5042-4DD5-A4B1-53A6C4D8E549",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:documaker:12.7.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C3D5995F-542C-489E-8940-991AAB17643B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "36CF85A9-2C29-46E7-961E-8ADD0B5822CF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E80555C7-DA1C-472C-9467-19554DCE4476",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6E8758C8-87D3-450A-878B-86CE8C9FC140",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B095CC03-7077-4A58-AB25-CC5380CDCE5A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7EA4D3C5-6A7C-4421-88EF-445A96DBCE0C",
                    "versionEndIncluding": "8.1.1",
                    "versionStartIncluding": "8.0.7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "47B0A947-E4C8-4C04-AD3B-950E59DF7A0E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1AC36036-07CE-4903-8FFB-445C6908F0CE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.11:*:*:*:*:*:*:*",
                    "matchCriteriaId": "435FDFA1-BF6A-499D-BDB6-88A26648DFD5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AB3F3F63-9543-4568-BCB1-1CAF88384142",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FC0C4CA4-1694-474E-8272-CF96E168D962",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.11:*:*:*:*:*:*:*",
                    "matchCriteriaId": "93E953D0-9C0C-4B03-9939-384A1F7E2BC9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_foreign_account_tax_compliance_act_management:8.0.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "767CC73D-2771-4BBC-9D74-4416AEC6BB2E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_foreign_account_tax_compliance_act_management:8.0.8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D33B68C6-2A4E-418C-A2BD-43A3CC5D1003",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_foreign_account_tax_compliance_act_management:8.0.11:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DAE3EA23-045D-474C-ABD8-916930D4E9E7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8BB9420F-87CE-4B4B-A417-AA6813CE1318",
                    "versionEndIncluding": "8.1.1.0.0",
                    "versionStartIncluding": "8.0.8.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.7:*:*:*:enterprise:*:*:*",
                    "matchCriteriaId": "B57ECC6E-CC64-4DE7-B657-3BA54EDDFFF4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.8:*:*:*:enterprise:*:*:*",
                    "matchCriteriaId": "10BBAD37-51A1-4819-807B-2642E9D4A69C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:flexcube_investor_servicing:12.0.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B0A34DF8-72CC-4A8E-84F2-C2DF4A0B9FAB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:flexcube_investor_servicing:12.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "21BE77B2-6368-470E-B9E6-21664D9A818A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:flexcube_investor_servicing:12.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3250073F-325A-4AFC-892F-F2005E3854A5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:flexcube_investor_servicing:12.4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0DDDC9C2-33D6-4123-9ABC-C9B809A6E88E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:flexcube_investor_servicing:14.4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "524429D6-8AF1-4713-A9B8-678B50A3762F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:flexcube_investor_servicing:14.5.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "ED21B958-0FD0-4697-9CE2-266DEE4E29DC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6762F207-93C7-4363-B2F9-7A7C6F8AF993",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1B74B912-152D-4F38-9FC1-741D6D0B27FC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2177A5E9-B260-499E-8D60-920679518425",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6329B1A2-75A8-4909-B4FB-77AC7232B6ED",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EC91D0AD-C721-4653-A2B7-4EA7D97F6392",
                    "versionEndExcluding": "12.3.0.1.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C0B3C50D-60BB-40B3-A146-BF7A1EC9ECC5",
                    "versionEndExcluding": "21.5.0.0.220118",
                    "versionStartIncluding": "19.1.0.0.1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:goldengate_application_adapters:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C970F0E8-0768-451A-8091-5C88761CA95D",
                    "versionEndExcluding": "23.1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:graph_server_and_client:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7E3417CF-4E94-4BA0-A05A-018D00EAC107",
                    "versionEndExcluding": "21.4.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:health_sciences_clinical_development_analytics:4.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4E45ADE3-2A3D-4FCA-BCDF-D0CC6CE0A23C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:health_sciences_inform_crf_submit:6.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AB8797ED-52E7-47B6-9F78-E2402671CCAC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:health_sciences_information_manager:3.0.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "97C10FBE-FD9A-4739-9303-5B6FC7551D66",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:health_sciences_information_manager:3.0.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CF45C905-9EFF-4108-9B70-9FFDDD6627A6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:healthcare_data_repository:7.0.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E03F5DEF-DDD7-4C8C-90EF-7E4BCDEFE34B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:healthcare_data_repository:8.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "66C673C4-A825-46C0-816B-103E1C058D03",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:healthcare_data_repository:8.1.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BA92E70A-2249-4144-B0B8-35501159ADB3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:healthcare_foundation:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CFDEE0AC-F2A4-4CA4-B8B5-E3F98712B072",
                    "versionEndIncluding": "7.3.0.2",
                    "versionStartIncluding": "7.3.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:healthcare_foundation:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D747A956-40A6-47D8-A813-FA4E13CB557F",
                    "versionEndIncluding": "8.0.2",
                    "versionStartIncluding": "8.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:healthcare_foundation:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "ED13F526-2D53-4627-B2C5-3678F5CC405B",
                    "versionEndIncluding": "8.1.1",
                    "versionStartIncluding": "8.1.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:healthcare_translational_research:4.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "523391D8-CB84-4EBD-B337-6A99F52E537F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_inventory_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "30B1475D-4F8D-4539-AED9-609C23944D14",
                    "versionEndExcluding": "9.1.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_inventory_management:9.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8865CE15-F9A1-4A46-AF93-B58356BDEE6F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6:*:*:*:*:*:*:*",
                    "matchCriteriaId": "95D6A426-B914-401F-9AB0-5F5E3A3FE138",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_reporting_and_analytics:9.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FCBF2756-B831-4E6E-A15B-2A11DD48DB7C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_suite8:8.10.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CBDA65DE-5727-49DC-8D50-DA81DB3E8841",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_suite8:8.11.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A577DCD3-6730-441A-B3BD-6199483FB1E2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_suite8:8.12.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "577A07A9-DBB1-49E6-B2CC-60B917097472",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_suite8:8.13.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D4833DCA-FC54-4F89-B2DF-8E39C9C49DF6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hospitality_suite8:8.14.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AD7E9060-BA5B-4682-AC0D-EE5105AD0332",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.7.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "52C13DE5-CA3C-414F-8813-BB0847433151",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:ilearning:6.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D361A9A8-15B0-4527-868B-80998772F2AB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:ilearning:6.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4A667A37-59EB-4539-ADCA-D5F789DB6744",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7F69B9A5-F21B-4904-9F27-95C0F7A628E3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_data_gateway:11.0.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BD4EE554-DFE7-4C16-BC98-574DC97FC85C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_data_gateway:11.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EE4160ED-75F2-4499-AC6C-90CD092A46E1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_data_gateway:11.2.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2F03BFDA-6904-42D7-8170-D6FD143BB16C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_data_gateway:11.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "32EE6974-6E2E-4DE8-9F2B-8FE0FCEFECFA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_data_gateway:11.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C85900AC-11DA-4FA8-A1E0-270240BF4B0E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4E0154DF-9EC0-4844-9B06-1C554CED3BC2",
                    "versionEndIncluding": "5.6.0",
                    "versionStartIncluding": "5.4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "428D2B1D-CFFD-49D1-BC05-2D85D22004DE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_policy_administration:11.0.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0F89EC4B-6D34-40F0-B7C6-C03D03F81C13",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_policy_administration:11.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "00C9E689-ED91-4A9D-B9C0-5BF4EC131409",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_policy_administration:11.2.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7EFA1879-0BF9-4493-9145-15100BC38C0A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_policy_administration:11.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EF958C28-4289-4433-8CD9-B6551F01926F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_policy_administration:11.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "57E9FC66-F6A0-4FB0-8D92-2C9B9E3F2184",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F3E25293-CB03-44CE-A8ED-04B3A0487A6A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4F9721E3-EE25-4C8A-9E0A-E60D465E0A97",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.2.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "212AC8FA-90E8-4FDF-BC57-D17CD8F2E35C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D7A6C04D-43B3-4B83-A185-7CBD838C97E4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E2B51896-E4DA-4FDA-979F-481FFB3E588A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.6.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4A87D1B6-87DF-4BC6-9C3E-F3AA47E22C4D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:oss_support_tools:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "71CB79ED-A93E-4CBD-BCDD-82C5A00B373B",
                    "versionEndExcluding": "2.12.42",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7E1E416B-920B-49A0-9523-382898C2979D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F47057A9-2DDE-4178-B140-F7D70EAED8F6",
                    "versionEndIncluding": "12.2.24",
                    "versionStartIncluding": "12.2.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_analytics:18.8.3.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FA9948AB-0CA6-4148-949C-E500466B45F5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_analytics:19.12.11.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "56D17905-5E69-4BD5-973B-30662AC3D678",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_analytics:20.12.12.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "70E72A74-F6A9-48EE-9279-3D9E53C2EC30",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_data_warehouse:18.8.3.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F14C6AB5-CC45-4753-A60F-1F527B063127",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_data_warehouse:19.12.11.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "583BBDF1-DBE4-486D-ABF8-7D2B0408490A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_data_warehouse:20.12.12.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C9810151-6F80-48FD-A51E-F063EB2B7324",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8B1C88FD-C2EC-4C96-AC7E-6F95C8763B48",
                    "versionEndIncluding": "17.12.11",
                    "versionStartIncluding": "17.12.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "301E7158-9090-467C-B3B4-30A8DB3B395D",
                    "versionEndIncluding": "18.8.12",
                    "versionStartIncluding": "18.8.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BBEFACB1-C8EA-492B-8F85-A564DB363C83",
                    "versionEndIncluding": "19.12.11",
                    "versionStartIncluding": "19.12.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E6B70E72-B9FC-4E49-8EDD-29C7E14F5792",
                    "versionEndIncluding": "20.12.7",
                    "versionStartIncluding": "20.12.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6AEB882B-4975-4417-848C-0EAB022EB893",
                    "versionEndIncluding": "17.12.20",
                    "versionStartIncluding": "17.12.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "51E74B18-96E2-4B13-8072-3A4B29ED42EC",
                    "versionEndIncluding": "18.8.24",
                    "versionStartIncluding": "18.8.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A3B41942-0EAE-4915-B560-C77855CF3AC1",
                    "versionEndIncluding": "19.12.17.0",
                    "versionStartIncluding": "19.12.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "798DD531-5B35-4D26-817D-5826666C9FA1",
                    "versionEndIncluding": "20.12.9.0",
                    "versionStartIncluding": "20.12.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_p6_professional_project_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0E96F120-57FB-432C-8D9A-A227A78BB4B4",
                    "versionEndIncluding": "17.12.20.0",
                    "versionStartIncluding": "17.12",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_p6_professional_project_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C97C52C9-16DD-4086-A1CF-19FD5C90FEA3",
                    "versionEndIncluding": "18.8.24.0",
                    "versionStartIncluding": "18.8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_p6_professional_project_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "05848067-59FF-4C90-A8BA-D1E4311B3A82",
                    "versionEndIncluding": "19.12.17.0",
                    "versionStartIncluding": "19.12.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_p6_professional_project_management:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DC6AD8C8-96ED-4CFB-9953-99139FABCE35",
                    "versionEndIncluding": "20.12.9.0",
                    "versionStartIncluding": "20.12.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9",
                    "versionEndIncluding": "17.12",
                    "versionStartIncluding": "17.7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*",
                    "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*",
                    "matchCriteriaId": "38340E3C-C452-4370-86D4-355B6B4E0A06",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E9C55C69-E22E-4B80-9371-5CD821D79FE2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:product_lifecycle_analytics:3.6.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7F978162-CB2C-4166-947A-9048C6E878BC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:rapid_planning:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CE004F32-F4DA-45A8-AD11-8924C4F1076A",
                    "versionEndIncluding": "12.2.11",
                    "versionStartIncluding": "12.2.6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:real_user_experience_insight:13.4.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CADD7026-EF85-40A5-8563-7A34C6941B1F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:real_user_experience_insight:13.5.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "58F019E8-F68D-41B5-9480-0A81616F2E7C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_analytics:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "90D4D479-0294-4F31-B719-8544C8DC4554",
                    "versionEndIncluding": "16.0.2",
                    "versionStartIncluding": "16.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_assortment_planning:16.0.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "48C9BD8E-7214-4B44-B549-6F11B3EA8A04",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F0735989-13BD-40B3-B954-AC0529C5B53D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "58405263-E84C-4071-BB23-165D49034A00",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_customer_insights:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E0B58B00-92A6-4033-B53A-839A4BDDF30F",
                    "versionEndIncluding": "16.0.2",
                    "versionStartIncluding": "16.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "31FFE404-027E-4B59-B3EF-BD20E1F7EECC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "798E4FEE-9B2B-436E-A2B3-B8AA1079892A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CB86F6C3-981E-4ECA-A5EB-9A9CD73D70C9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_financial_integration:16.0.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "44AA1B51-8A24-48F0-B16F-803D69698707",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7435071D-0C95-4686-A978-AFC4C9A0D0FE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8CFCE558-9972-46A2-8539-C16044F1BAA9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A1194C4E-CF42-4B4D-BA9A-40FDD28F1D58",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "822A3C37-86F2-4E91-BE91-2A859F983941",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BD311C33-A309-44D5-BBFB-539D72C7F8C4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AE1BC44A-F0AF-41CD-9CEB-B07AB5ADAB38",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "38E74E68-7F19-4EF3-AC00-3C249EAAA39E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_order_broker:18.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0783F0D1-8FAC-4BCA-A6F5-C5C60E86D56D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_order_broker:19.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C7BD0D41-1BED-4C4F-95C8-8987C98908DA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_order_management_system:19.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "99B5DC78-1C24-4F2B-A254-D833FAF47013",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E13DF2AE-F315-4085-9172-6C8B21AF1C9E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6B1A4F12-3E64-41CF-B2B3-B6AB734B69E0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "24A3C819-5151-4543-A5C6-998C9387C8A2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4FB98961-8C99-4490-A6B8-9A5158784F5A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_price_management:14.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5B956113-5B3B-436D-858B-8F29FB304364",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_price_management:15.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7E8917F6-00E7-47EC-B86D-A3B11D5F0E0D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_price_management:16.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EFC5F424-119D-4C66-8251-E735EEFBC0BA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BDB925C6-2CBC-4D88-B9EA-F246F4F7A206",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E702EBED-DB39-4084-84B1-258BC5FE7545",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3F7956BF-D5B6-484B-999C-36B45CD8B75B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DEE71EA5-B315-4F1E-BFEE-EC426B562F7E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_service_backbone:19.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9DA6B655-A445-42E5-B6D9-70AB1C04774A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_store_inventory_management:14.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C1933509-1BEA-45DA-B6AF-2713B432B1F5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_store_inventory_management:15.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4DA1BF68-635B-4577-B3F7-DEBC39567C8F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_store_inventory_management:16.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3B202AEF-1197-441B-8EA1-2913BFD8A545",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DEC41EB8-73B4-4BDF-9321-F34EC0BAF9E6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "48EFC111-B01B-4C34-87E4-D6B2C40C0122",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "073FEA23-E46A-4C73-9D29-95CFF4F5A59D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A69FB468-EAF3-4E67-95E7-DF92C281C1F1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "889916ED-5EB2-49D6-8400-E6DBBD6C287F",
                    "versionEndIncluding": "21.12",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:spatial_studio:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6DFFDFD4-0D11-4F63-A0AD-A0C65A067912",
                    "versionEndExcluding": "21.2.1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6953CFDB-33C0-4B8E-BBBD-E460A17E8ED3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:storagetek_tape_analytics:2.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EE6B6243-9FE9-432B-B5A8-20E515E06A93",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:thesaurus_management_system:5.2.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "01E3B232-073E-433B-977A-1742B75109B7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:thesaurus_management_system:5.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6F6FDC33-D57E-4C6A-B633-BFC587147037",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:thesaurus_management_system:5.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F3B01572-9D32-44B2-8FCF-C282C887DB51",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "20290BBC-E3C9-4B96-94FE-2DFADD4BF1F1",
                    "versionEndExcluding": "21.1.1.1.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:timesten_in-memory_database:21.1.1.1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AF7F55C1-2114-4D22-B696-6E20337E52FF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "51309958-121D-4649-AB9A-EBFA3A49F7CB",
                    "versionEndIncluding": "4.3.0.6.0",
                    "versionStartIncluding": "4.3.0.1.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1FAC3840-2CF8-44CE-81BB-EEEBDA00A34A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3F906F04-39E4-4BE4-8A73-9D058AAADB43",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7B393A82-476A-4270-A903-38ED4169E431",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A3ED272C-A545-4F8C-86C0-2736B3F2DCAF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C5B4C338-11E1-4235-9D5A-960B2711AC39",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8C93F84E-9680-44EF-8656-D27440B51698",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:oracle:zfs_storage_application_integration_engineering_software:1.3.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CB85582D-0106-47F1-894F-0BC4FF0B5462",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
          },
          {
            "lang": "es",
            "value": "Una vulnerabilidad en el componente Advanced Networking Option de Oracle Database Server. Las versiones compatibles que est\u00e1n afectadas son 12.1.0.2, 12.2.0.1 y 19c. Una vulnerabilidad dif\u00edcil de explotar permite a un atacante no autenticado con acceso a la red por medio de Oracle Net comprometer a advanced Networking Option. Los ataques con \u00e9xito requieren una interacci\u00f3n humana de una persona diferente del atacante y, mientras la vulnerabilidad se encuentra en Advanced Networking Option, los ataques pueden afectar significativamente a productos adicionales. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en la toma de control de Advanced Networking Option. Nota: La actualizaci\u00f3n de parches cr\u00edticos de julio de 2021 introduce una serie de cambios en el Cifrado de Red Nativo para hacer frente a la vulnerabilidad (CVE-2021-2351 y prevenir el uso de cifrados m\u00e1s d\u00e9biles. Los clientes deben revisar: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Puntuaci\u00f3n Base 8.3 (Impactos en la Confidencialidad, Integridad y Disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)"
          }
        ],
        "id": "CVE-2021-2351",
        "lastModified": "2024-02-16T18:48:45.617",
        "metrics": {
          "cvssMetricV2": [
            {
              "acInsufInfo": false,
              "baseSeverity": "MEDIUM",
              "cvssData": {
                "accessComplexity": "HIGH",
                "accessVector": "NETWORK",
                "authentication": "NONE",
                "availabilityImpact": "PARTIAL",
                "baseScore": 5.1,
                "confidentialityImpact": "PARTIAL",
                "integrityImpact": "PARTIAL",
                "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
                "version": "2.0"
              },
              "exploitabilityScore": 4.9,
              "impactScore": 6.4,
              "obtainAllPrivilege": false,
              "obtainOtherPrivilege": false,
              "obtainUserPrivilege": false,
              "source": "nvd@nist.gov",
              "type": "Primary",
              "userInteractionRequired": true
            }
          ],
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "HIGH",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 8.3,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "CHANGED",
                "userInteraction": "REQUIRED",
                "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 1.6,
              "impactScore": 6.0,
              "source": "secalert_us@oracle.com",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "HIGH",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 7.5,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "REQUIRED",
                "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 1.6,
              "impactScore": 5.9,
              "source": "nvd@nist.gov",
              "type": "Secondary"
            }
          ]
        },
        "published": "2021-07-21T15:15:21.827",
        "references": [
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Exploit",
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Exploit",
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Exploit",
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Dec/19"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Exploit",
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Dec/20"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Patch",
              "Vendor Advisory"
            ],
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Patch",
              "Vendor Advisory"
            ],
            "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://www.oracle.com/security-alerts/cpujan2023.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Patch",
              "Vendor Advisory"
            ],
            "url": "https://www.oracle.com/security-alerts/cpujul2021.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
          },
          {
            "source": "secalert_us@oracle.com",
            "tags": [
              "Patch",
              "Vendor Advisory"
            ],
            "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
          }
        ],
        "sourceIdentifier": "secalert_us@oracle.com",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-327"
              },
              {
                "lang": "en",
                "value": "CWE-384"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.