gsd-2021-2351
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: "Changes in Native Network Encryption with the July 2021 Critical Patch Update" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Aliases
Aliases



{
   GSD: {
      alias: "CVE-2021-2351",
      description: "Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
      id: "GSD-2021-2351",
      references: [
         "https://packetstormsecurity.com/files/cve/CVE-2021-2351",
      ],
   },
   gsd: {
      metadata: {
         exploitCode: "unknown",
         remediation: "unknown",
         reportConfidence: "confirmed",
         type: "vulnerability",
      },
      osvSchema: {
         aliases: [
            "CVE-2021-2351",
         ],
         details: "Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
         id: "GSD-2021-2351",
         modified: "2023-12-13T01:23:14.879358Z",
         schema_version: "1.4.0",
      },
   },
   namespaces: {
      "cve.org": {
         CVE_data_meta: {
            ASSIGNER: "secalert_us@oracle.com",
            ID: "CVE-2021-2351",
            STATE: "PUBLIC",
         },
         affects: {
            vendor: {
               vendor_data: [
                  {
                     product: {
                        product_data: [
                           {
                              product_name: "WebLogic Server",
                              version: {
                                 version_data: [
                                    {
                                       version_affected: "=",
                                       version_value: "12.2.1.3.0",
                                    },
                                    {
                                       version_affected: "=",
                                       version_value: "12.2.1.4.0",
                                    },
                                    {
                                       version_affected: "=",
                                       version_value: "14.1.1.0.0",
                                    },
                                 ],
                              },
                           },
                        ],
                     },
                     vendor_name: "Oracle Corporation",
                  },
               ],
            },
         },
         data_format: "MITRE",
         data_type: "CVE",
         data_version: "4.0",
         description: {
            description_data: [
               {
                  lang: "eng",
                  value: "Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
               },
            ],
         },
         impact: {
            cvss: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.3,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
            ],
         },
         problemtype: {
            problemtype_data: [
               {
                  description: [
                     {
                        lang: "eng",
                        value: "Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option.",
                     },
                  ],
               },
            ],
         },
         references: {
            reference_data: [
               {
                  name: "https://www.oracle.com/security-alerts/cpujul2021.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpujul2021.html",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  name: "http://seclists.org/fulldisclosure/2021/Dec/19",
                  refsource: "MISC",
                  url: "http://seclists.org/fulldisclosure/2021/Dec/19",
               },
               {
                  name: "http://seclists.org/fulldisclosure/2021/Dec/20",
                  refsource: "MISC",
                  url: "http://seclists.org/fulldisclosure/2021/Dec/20",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpujan2022.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpujan2022.html",
               },
               {
                  name: "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html",
                  refsource: "MISC",
                  url: "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html",
               },
               {
                  name: "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html",
                  refsource: "MISC",
                  url: "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpujul2022.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpujul2022.html",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpujan2023.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpujan2023.html",
               },
            ],
         },
      },
      "nvd.nist.gov": {
         cve: {
            configurations: [
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:oracle:advanced_networking_option:12.1.0.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "E95885F4-38B5-445A-B084-6B87172F2082",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:advanced_networking_option:12.2.0.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "FC810AC7-4185-4E20-AFE8-72A97C2933EA",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:advanced_networking_option:19c:*:*:*:*:*:*:*",
                              matchCriteriaId: "231C1E97-2198-4DD7-8BD1-5FF4DDA14CDA",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "80C9DBB8-3D50-4D5D-859A-B022EB7C2E64",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*",
                              matchCriteriaId: "C650FEDB-E903-4C2D-AD40-282AB5F2E3C2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.2.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "A4AA4B21-1BA9-4ED8-B9EA-558AF8655D24",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "9C3F9EE5-FCFC-45B8-9F57-C05D42EE0FF0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:airlines_data_model:12.1.1.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "06480458-3216-4C42-9270-F68A41EEC147",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:airlines_data_model:12.2.0.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "480BF1CB-11D7-4D86-A99E-960F316F2E1B",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:application_performance_management:13.4.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "F84E5662-0289-4ED5-A112-BC506508216C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:application_performance_management:13.5.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "AD312681-73A4-4B21-BDE8-50DED7E3E0CF",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "A125E817-F974-4509-872C-B71933F42AD1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_analytics:8.2.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "BC3D0C4E-0B40-4ACF-BD9E-104CC1D77521",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_analytics:8.2.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "E67940FD-3BA7-40A8-8E40-44B37D23E2DE",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_analytics:8.2.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "EE6EB4DE-33DA-4810-96BD-29C82B433714",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_insight:8.2.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "F7FCB446-49A7-48B9-8808-E72A4E2E48C7",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_insight:8.2.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "9E9B2F53-257E-49E2-83C3-0840BDB4D67C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_insight:8.2.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "6CF34B1B-0FC0-4EA6-830D-D2191337D451",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_mart:8.2.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "EA67581B-F8FD-416E-852F-859D642B7405",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_mart:8.2.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "32ACEED2-BA43-4EF7-9183-2F01CC277FB1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_mart:8.2.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "18B967BB-2233-4FB2-B10D-9A338E1B4089",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_safety:8.2.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "09B79608-5D94-45C3-ADF0-B181B92C3014",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_safety:8.2.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "9F05D844-38BD-4EEB-AF91-E5ED18B1E7E8",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:argus_safety:8.2.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "25193811-46CE-4A0E-B22D-67BE99FAD450",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_apis:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "6DF2D056-3118-4C31-BEDD-69F016898CBB",
                              versionEndIncluding: "18.3",
                              versionStartIncluding: "18.1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_apis:19.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "CF34B11F-3DE1-4C22-8EB1-AEE5CE5E4172",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_apis:19.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "86F03B63-F922-45CD-A7D1-326DB0042875",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_apis:20.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "7CBFC93F-8B39-45A2-981C-59B187169BD4",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_apis:21.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "0843465C-F940-4FFC-998D-9A2668B75EA0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_digital_experience:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "366A6277-5D74-44C8-94A9-8ADB5568B5FB",
                              versionEndIncluding: "18.3",
                              versionStartIncluding: "18.1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_digital_experience:17.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "560F20E6-AEA1-4CE5-A393-C9B2CF334C5C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "F7BDFC10-45A0-46D8-AB92-4A5E2C1C76ED",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "18127694-109C-4E7E-AE79-0BA351849291",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "33F68878-BC19-4DB8-8A72-BD9FE3D0ACEC",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_digital_experience:21.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "0D6895A6-511A-4DC6-9F9B-58E05B86BDB1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_enterprise_default_management:2.10.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "74C7E2F1-17FC-4322-A5C3-F7EB612BA4F5",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "320D36DA-D99F-4149-B582-3F4AB2F41A1B",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "132CE62A-FBFC-4001-81EC-35D81F73AF48",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "645AA3D1-C8B5-4CD2-8ACE-31541FA267F0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:banking_platform:2.12.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "BDC6D658-09EA-4C41-869F-1C2EA163F751",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "384DEDD9-CB26-4306-99D8-83068A9B23ED",
                              versionEndExcluding: "23.1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "2ECE8F5F-4417-4412-B857-F1ACDEED4FC2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:clinical:5.2.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "4B2CEA84-0983-4C40-B923-99244ABCF32D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:clinical:5.2.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "2FD798A8-38B7-42C1-9043-863D16CE7ACA",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:commerce_platform:11.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "57DA1DD8-E9F1-43C6-BCA2-1E9C92B1664C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:commerce_platform:11.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "869CDD22-4A6C-4665-AA37-E340B07EF81C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "8CDE72F7-ED9D-4A53-BF63-DF6711FFDEF4",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_application_session_controller:3.9.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "787E2C1B-9BAD-4018-8495-E9BE75628BB8",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*",
                              matchCriteriaId: "B465F237-0271-4389-8035-89C07A52350D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*",
                              matchCriteriaId: "123CB9B5-C800-47FD-BD0C-BE44198E97E2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.5.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "4063FAD6-21D4-42C7-87C0-D299532E0982",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "59275C23-53C0-4890-A941-A71226B50CFB",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "0172500D-DE51-44E0-91E8-C8F36617C1F8",
                              versionEndIncluding: "12.0.4.0.0",
                              versionStartIncluding: "12.0.1.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "E99E7D49-AE53-4D16-AB24-EBEAAD084289",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_data_model:11.3.2.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "69C215AB-25B4-47A6-AD6A-A60D2C0FF72F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_data_model:11.3.2.2.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "8E77E48F-1521-4C89-A5D0-A7F0A8D21AD1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_data_model:11.3.2.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "6F88A2F3-E201-4C68-8D11-0A5C76CDB071",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_data_model:12.1.0.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "CBD877F8-E6EF-4314-AAC0-36F81F4908DF",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_data_model:12.1.2.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "3D7356B6-E197-4978-BF18-2CFD4D350A76",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*",
                              matchCriteriaId: "1B54457C-8305-4F82-BE1E-DBA030A8E676",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_design_studio:7.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "C756C62B-E655-4770-8E85-B1995889E416",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_design_studio:7.4.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "93F65B4C-59D5-450A-9955-7FDA32252B0F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "A67AA54B-258D-4D09-9ACB-4085E0B3E585",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "B5AAD5EB-403D-4DCD-96F6-3871889B9403",
                              versionEndIncluding: "8.2.3",
                              versionStartIncluding: "8.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "DE7A60DB-A287-4E61-8131-B6314007191B",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "64BCB9E3-883D-4C1F-9785-2E182BA47B5B",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "F28B94B3-D940-4B1C-9E72-F061515D24F2",
                              versionEndIncluding: "12.0.4.0.0",
                              versionStartIncluding: "12.0.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "EB9047B1-DA8C-4BFD-BE41-728BD7ECF3E6",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*",
                              matchCriteriaId: "FB92D8A7-2ABD-4B70-A32C-4B6B866C5B8B",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*",
                              matchCriteriaId: "B21E6EEF-2AB7-4E96-B092-1F49D11B4175",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*",
                              matchCriteriaId: "D6BDB265-293F-4F27-8CE0-576DF3ECD3BC",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*",
                              matchCriteriaId: "53600579-4542-4D80-A93C-3E45938C749D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "062E4E7C-55BB-46F3-8B61-5A663B565891",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "D96CE74A-EB3A-489E-9229-43810DD46F64",
                              versionEndIncluding: "8.2.5.0",
                              versionStartIncluding: "8.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "EAE0FAB3-DE56-4271-B3F1-FF665F55B728",
                              versionEndIncluding: "8.2.5",
                              versionStartIncluding: "8.2.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "9901F6BA-78D5-45B8-9409-07FF1C6DDD38",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "9FADE563-5AAA-42FF-B43F-35B20A2386C9",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:demantra_demand_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "132DE874-6E47-452A-9FDD-27D5A41F046E",
                              versionEndIncluding: "12.2.11",
                              versionStartIncluding: "12.2.6",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:documaker:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "603C00AA-DBF3-4F62-A74D-8AE596800B4C",
                              versionEndIncluding: "12.6.4",
                              versionStartIncluding: "12.6.2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:documaker:12.6.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "AE3CF700-5042-4DD5-A4B1-53A6C4D8E549",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:documaker:12.7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "C3D5995F-542C-489E-8940-991AAB17643B",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "36CF85A9-2C29-46E7-961E-8ADD0B5822CF",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "E80555C7-DA1C-472C-9467-19554DCE4476",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "6E8758C8-87D3-450A-878B-86CE8C9FC140",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "B095CC03-7077-4A58-AB25-CC5380CDCE5A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "7EA4D3C5-6A7C-4421-88EF-445A96DBCE0C",
                              versionEndIncluding: "8.1.1",
                              versionStartIncluding: "8.0.7",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "47B0A947-E4C8-4C04-AD3B-950E59DF7A0E",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8:*:*:*:*:*:*:*",
                              matchCriteriaId: "1AC36036-07CE-4903-8FFB-445C6908F0CE",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.11:*:*:*:*:*:*:*",
                              matchCriteriaId: "435FDFA1-BF6A-499D-BDB6-88A26648DFD5",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "AB3F3F63-9543-4568-BCB1-1CAF88384142",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8:*:*:*:*:*:*:*",
                              matchCriteriaId: "FC0C4CA4-1694-474E-8272-CF96E168D962",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.11:*:*:*:*:*:*:*",
                              matchCriteriaId: "93E953D0-9C0C-4B03-9939-384A1F7E2BC9",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_foreign_account_tax_compliance_act_management:8.0.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "767CC73D-2771-4BBC-9D74-4416AEC6BB2E",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_foreign_account_tax_compliance_act_management:8.0.8:*:*:*:*:*:*:*",
                              matchCriteriaId: "D33B68C6-2A4E-418C-A2BD-43A3CC5D1003",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_foreign_account_tax_compliance_act_management:8.0.11:*:*:*:*:*:*:*",
                              matchCriteriaId: "DAE3EA23-045D-474C-ABD8-916930D4E9E7",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_model_management_and_governance:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "8BB9420F-87CE-4B4B-A417-AA6813CE1318",
                              versionEndIncluding: "8.1.1.0.0",
                              versionStartIncluding: "8.0.8.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.7:*:*:*:enterprise:*:*:*",
                              matchCriteriaId: "B57ECC6E-CC64-4DE7-B657-3BA54EDDFFF4",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.8:*:*:*:enterprise:*:*:*",
                              matchCriteriaId: "10BBAD37-51A1-4819-807B-2642E9D4A69C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:flexcube_investor_servicing:12.0.4:*:*:*:*:*:*:*",
                              matchCriteriaId: "B0A34DF8-72CC-4A8E-84F2-C2DF4A0B9FAB",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:flexcube_investor_servicing:12.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "21BE77B2-6368-470E-B9E6-21664D9A818A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:flexcube_investor_servicing:12.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "3250073F-325A-4AFC-892F-F2005E3854A5",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:flexcube_investor_servicing:12.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "0DDDC9C2-33D6-4123-9ABC-C9B809A6E88E",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:flexcube_investor_servicing:14.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "524429D6-8AF1-4713-A9B8-678B50A3762F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:flexcube_investor_servicing:14.5.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "ED21B958-0FD0-4697-9CE2-266DEE4E29DC",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "6762F207-93C7-4363-B2F9-7A7C6F8AF993",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "1B74B912-152D-4F38-9FC1-741D6D0B27FC",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "2177A5E9-B260-499E-8D60-920679518425",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "6329B1A2-75A8-4909-B4FB-77AC7232B6ED",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "EC91D0AD-C721-4653-A2B7-4EA7D97F6392",
                              versionEndExcluding: "12.3.0.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "C0B3C50D-60BB-40B3-A146-BF7A1EC9ECC5",
                              versionEndExcluding: "21.5.0.0.220118",
                              versionStartIncluding: "19.1.0.0.1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:goldengate_application_adapters:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "C970F0E8-0768-451A-8091-5C88761CA95D",
                              versionEndExcluding: "23.1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:graph_server_and_client:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "7E3417CF-4E94-4BA0-A05A-018D00EAC107",
                              versionEndExcluding: "21.4.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:health_sciences_clinical_development_analytics:4.0.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "4E45ADE3-2A3D-4FCA-BCDF-D0CC6CE0A23C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:health_sciences_inform_crf_submit:6.2.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "AB8797ED-52E7-47B6-9F78-E2402671CCAC",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:health_sciences_information_manager:3.0.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "97C10FBE-FD9A-4739-9303-5B6FC7551D66",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:health_sciences_information_manager:3.0.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "CF45C905-9EFF-4108-9B70-9FFDDD6627A6",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:healthcare_data_repository:7.0.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "E03F5DEF-DDD7-4C8C-90EF-7E4BCDEFE34B",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:healthcare_data_repository:8.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "66C673C4-A825-46C0-816B-103E1C058D03",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:healthcare_data_repository:8.1.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "BA92E70A-2249-4144-B0B8-35501159ADB3",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:healthcare_foundation:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "CFDEE0AC-F2A4-4CA4-B8B5-E3F98712B072",
                              versionEndIncluding: "7.3.0.2",
                              versionStartIncluding: "7.3.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:healthcare_foundation:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "D747A956-40A6-47D8-A813-FA4E13CB557F",
                              versionEndIncluding: "8.0.2",
                              versionStartIncluding: "8.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:healthcare_foundation:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "ED13F526-2D53-4627-B2C5-3678F5CC405B",
                              versionEndIncluding: "8.1.1",
                              versionStartIncluding: "8.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:healthcare_translational_research:4.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "523391D8-CB84-4EBD-B337-6A99F52E537F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_inventory_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "30B1475D-4F8D-4539-AED9-609C23944D14",
                              versionEndExcluding: "9.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_inventory_management:9.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "8865CE15-F9A1-4A46-AF93-B58356BDEE6F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_opera_5:5.6:*:*:*:*:*:*:*",
                              matchCriteriaId: "95D6A426-B914-401F-9AB0-5F5E3A3FE138",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_reporting_and_analytics:9.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "FCBF2756-B831-4E6E-A15B-2A11DD48DB7C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_suite8:8.10.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "CBDA65DE-5727-49DC-8D50-DA81DB3E8841",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_suite8:8.11.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "A577DCD3-6730-441A-B3BD-6199483FB1E2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_suite8:8.12.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "577A07A9-DBB1-49E6-B2CC-60B917097472",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_suite8:8.13.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "D4833DCA-FC54-4F89-B2DF-8E39C9C49DF6",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hospitality_suite8:8.14.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "AD7E9060-BA5B-4682-AC0D-EE5105AD0332",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "52C13DE5-CA3C-414F-8813-BB0847433151",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:ilearning:6.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "D361A9A8-15B0-4527-868B-80998772F2AB",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:ilearning:6.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "4A667A37-59EB-4539-ADCA-D5F789DB6744",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "7F69B9A5-F21B-4904-9F27-95C0F7A628E3",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_data_gateway:11.0.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "BD4EE554-DFE7-4C16-BC98-574DC97FC85C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_data_gateway:11.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "EE4160ED-75F2-4499-AC6C-90CD092A46E1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_data_gateway:11.2.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "2F03BFDA-6904-42D7-8170-D6FD143BB16C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_data_gateway:11.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "32EE6974-6E2E-4DE8-9F2B-8FE0FCEFECFA",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_data_gateway:11.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "C85900AC-11DA-4FA8-A1E0-270240BF4B0E",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "4E0154DF-9EC0-4844-9B06-1C554CED3BC2",
                              versionEndIncluding: "5.6.0",
                              versionStartIncluding: "5.4",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.2.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "428D2B1D-CFFD-49D1-BC05-2D85D22004DE",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_policy_administration:11.0.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "0F89EC4B-6D34-40F0-B7C6-C03D03F81C13",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_policy_administration:11.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "00C9E689-ED91-4A9D-B9C0-5BF4EC131409",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_policy_administration:11.2.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "7EFA1879-0BF9-4493-9145-15100BC38C0A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_policy_administration:11.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "EF958C28-4289-4433-8CD9-B6551F01926F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_policy_administration:11.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "57E9FC66-F6A0-4FB0-8D92-2C9B9E3F2184",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "F3E25293-CB03-44CE-A8ED-04B3A0487A6A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "4F9721E3-EE25-4C8A-9E0A-E60D465E0A97",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.2.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "212AC8FA-90E8-4FDF-BC57-D17CD8F2E35C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "D7A6C04D-43B3-4B83-A185-7CBD838C97E4",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "E2B51896-E4DA-4FDA-979F-481FFB3E588A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.6.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "4A87D1B6-87DF-4BC6-9C3E-F3AA47E22C4D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:oss_support_tools:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "71CB79ED-A93E-4CBD-BCDD-82C5A00B373B",
                              versionEndExcluding: "2.12.42",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
                              matchCriteriaId: "7E1E416B-920B-49A0-9523-382898C2979D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
                              matchCriteriaId: "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
                              matchCriteriaId: "C8AF00C6-B97F-414D-A8DF-057E6BFD8597",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:policy_automation:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "F47057A9-2DDE-4178-B140-F7D70EAED8F6",
                              versionEndIncluding: "12.2.24",
                              versionStartIncluding: "12.2.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_analytics:18.8.3.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "FA9948AB-0CA6-4148-949C-E500466B45F5",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_analytics:19.12.11.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "56D17905-5E69-4BD5-973B-30662AC3D678",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_analytics:20.12.12.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "70E72A74-F6A9-48EE-9279-3D9E53C2EC30",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_data_warehouse:18.8.3.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "F14C6AB5-CC45-4753-A60F-1F527B063127",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_data_warehouse:19.12.11.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "583BBDF1-DBE4-486D-ABF8-7D2B0408490A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_data_warehouse:20.12.12.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "C9810151-6F80-48FD-A51E-F063EB2B7324",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "8B1C88FD-C2EC-4C96-AC7E-6F95C8763B48",
                              versionEndIncluding: "17.12.11",
                              versionStartIncluding: "17.12.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "301E7158-9090-467C-B3B4-30A8DB3B395D",
                              versionEndIncluding: "18.8.12",
                              versionStartIncluding: "18.8.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "BBEFACB1-C8EA-492B-8F85-A564DB363C83",
                              versionEndIncluding: "19.12.11",
                              versionStartIncluding: "19.12.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "E6B70E72-B9FC-4E49-8EDD-29C7E14F5792",
                              versionEndIncluding: "20.12.7",
                              versionStartIncluding: "20.12.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "6AEB882B-4975-4417-848C-0EAB022EB893",
                              versionEndIncluding: "17.12.20",
                              versionStartIncluding: "17.12.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "51E74B18-96E2-4B13-8072-3A4B29ED42EC",
                              versionEndIncluding: "18.8.24",
                              versionStartIncluding: "18.8.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "A3B41942-0EAE-4915-B560-C77855CF3AC1",
                              versionEndIncluding: "19.12.17.0",
                              versionStartIncluding: "19.12.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "798DD531-5B35-4D26-817D-5826666C9FA1",
                              versionEndIncluding: "20.12.9.0",
                              versionStartIncluding: "20.12.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_p6_professional_project_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "0E96F120-57FB-432C-8D9A-A227A78BB4B4",
                              versionEndIncluding: "17.12.20.0",
                              versionStartIncluding: "17.12",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_p6_professional_project_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "C97C52C9-16DD-4086-A1CF-19FD5C90FEA3",
                              versionEndIncluding: "18.8.24.0",
                              versionStartIncluding: "18.8",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_p6_professional_project_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "05848067-59FF-4C90-A8BA-D1E4311B3A82",
                              versionEndIncluding: "19.12.17.0",
                              versionStartIncluding: "19.12.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_p6_professional_project_management:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "DC6AD8C8-96ED-4CFB-9953-99139FABCE35",
                              versionEndIncluding: "20.12.9.0",
                              versionStartIncluding: "20.12.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "08FA59A8-6A62-4B33-8952-D6E658F8DAC9",
                              versionEndIncluding: "17.12",
                              versionStartIncluding: "17.7",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
                              matchCriteriaId: "202AD518-2E9B-4062-B063-9858AE1F9CE2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*",
                              matchCriteriaId: "10864586-270E-4ACF-BDCC-ECFCD299305F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*",
                              matchCriteriaId: "38340E3C-C452-4370-86D4-355B6B4E0A06",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:*",
                              matchCriteriaId: "E9C55C69-E22E-4B80-9371-5CD821D79FE2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:product_lifecycle_analytics:3.6.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "7F978162-CB2C-4166-947A-9048C6E878BC",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:rapid_planning:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "CE004F32-F4DA-45A8-AD11-8924C4F1076A",
                              versionEndIncluding: "12.2.11",
                              versionStartIncluding: "12.2.6",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:real_user_experience_insight:13.4.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "CADD7026-EF85-40A5-8563-7A34C6941B1F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:real_user_experience_insight:13.5.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "58F019E8-F68D-41B5-9480-0A81616F2E7C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_analytics:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "90D4D479-0294-4F31-B719-8544C8DC4554",
                              versionEndIncluding: "16.0.2",
                              versionStartIncluding: "16.0.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_assortment_planning:16.0.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "48C9BD8E-7214-4B44-B549-6F11B3EA8A04",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "F0735989-13BD-40B3-B954-AC0529C5B53D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "58405263-E84C-4071-BB23-165D49034A00",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_customer_insights:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "E0B58B00-92A6-4033-B53A-839A4BDDF30F",
                              versionEndIncluding: "16.0.2",
                              versionStartIncluding: "16.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.8:*:*:*:*:*:*:*",
                              matchCriteriaId: "31FFE404-027E-4B59-B3EF-BD20E1F7EECC",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "798E4FEE-9B2B-436E-A2B3-B8AA1079892A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "CB86F6C3-981E-4ECA-A5EB-9A9CD73D70C9",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_financial_integration:16.0.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "44AA1B51-8A24-48F0-B16F-803D69698707",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "7435071D-0C95-4686-A978-AFC4C9A0D0FE",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "8CFCE558-9972-46A2-8539-C16044F1BAA9",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "A1194C4E-CF42-4B4D-BA9A-40FDD28F1D58",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "822A3C37-86F2-4E91-BE91-2A859F983941",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "BD311C33-A309-44D5-BBFB-539D72C7F8C4",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "AE1BC44A-F0AF-41CD-9CEB-B07AB5ADAB38",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "38E74E68-7F19-4EF3-AC00-3C249EAAA39E",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_order_broker:18.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "0783F0D1-8FAC-4BCA-A6F5-C5C60E86D56D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_order_broker:19.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "C7BD0D41-1BED-4C4F-95C8-8987C98908DA",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_order_management_system:19.5:*:*:*:*:*:*:*",
                              matchCriteriaId: "99B5DC78-1C24-4F2B-A254-D833FAF47013",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "E13DF2AE-F315-4085-9172-6C8B21AF1C9E",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "6B1A4F12-3E64-41CF-B2B3-B6AB734B69E0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "24A3C819-5151-4543-A5C6-998C9387C8A2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "4FB98961-8C99-4490-A6B8-9A5158784F5A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_price_management:14.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "5B956113-5B3B-436D-858B-8F29FB304364",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_price_management:15.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "7E8917F6-00E7-47EC-B86D-A3B11D5F0E0D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_price_management:16.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "EFC5F424-119D-4C66-8251-E735EEFBC0BA",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "BDB925C6-2CBC-4D88-B9EA-F246F4F7A206",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "E702EBED-DB39-4084-84B1-258BC5FE7545",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "3F7956BF-D5B6-484B-999C-36B45CD8B75B",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "DEE71EA5-B315-4F1E-BFEE-EC426B562F7E",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_service_backbone:19.0.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "9DA6B655-A445-42E5-B6D9-70AB1C04774A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_store_inventory_management:14.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "C1933509-1BEA-45DA-B6AF-2713B432B1F5",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_store_inventory_management:15.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "4DA1BF68-635B-4577-B3F7-DEBC39567C8F",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_store_inventory_management:16.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "3B202AEF-1197-441B-8EA1-2913BFD8A545",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
                              matchCriteriaId: "DEC41EB8-73B4-4BDF-9321-F34EC0BAF9E6",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "48EFC111-B01B-4C34-87E4-D6B2C40C0122",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "073FEA23-E46A-4C73-9D29-95CFF4F5A59D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "A69FB468-EAF3-4E67-95E7-DF92C281C1F1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "889916ED-5EB2-49D6-8400-E6DBBD6C287F",
                              versionEndIncluding: "21.12",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:spatial_studio:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "6DFFDFD4-0D11-4F63-A0AD-A0C65A067912",
                              versionEndExcluding: "21.2.1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "6953CFDB-33C0-4B8E-BBBD-E460A17E8ED3",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:storagetek_tape_analytics:2.4:*:*:*:*:*:*:*",
                              matchCriteriaId: "EE6B6243-9FE9-432B-B5A8-20E515E06A93",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:thesaurus_management_system:5.2.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "01E3B232-073E-433B-977A-1742B75109B7",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:thesaurus_management_system:5.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "6F6FDC33-D57E-4C6A-B633-BFC587147037",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:thesaurus_management_system:5.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "F3B01572-9D32-44B2-8FCF-C282C887DB51",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "20290BBC-E3C9-4B96-94FE-2DFADD4BF1F1",
                              versionEndExcluding: "21.1.1.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:timesten_in-memory_database:21.1.1.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "AF7F55C1-2114-4D22-B696-6E20337E52FF",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "51309958-121D-4649-AB9A-EBFA3A49F7CB",
                              versionEndIncluding: "4.3.0.6.0",
                              versionStartIncluding: "4.3.0.1.0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "1FAC3840-2CF8-44CE-81BB-EEEBDA00A34A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "3F906F04-39E4-4BE4-8A73-9D058AAADB43",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "7B393A82-476A-4270-A903-38ED4169E431",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "A3ED272C-A545-4F8C-86C0-2736B3F2DCAF",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:*",
                              matchCriteriaId: "C5B4C338-11E1-4235-9D5A-960B2711AC39",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "8C93F84E-9680-44EF-8656-D27440B51698",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "F14A818F-AA16-4438-A3E4-E64C9287AC66",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "04BCDC24-4A21-473C-8733-0D9CFB38A752",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:zfs_storage_application_integration_engineering_software:1.3.3:*:*:*:*:*:*:*",
                              matchCriteriaId: "CB85582D-0106-47F1-894F-0BC4FF0B5462",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
            ],
            descriptions: [
               {
                  lang: "en",
                  value: "Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
               },
               {
                  lang: "es",
                  value: "Una vulnerabilidad en el componente Advanced Networking Option de Oracle Database Server. Las versiones compatibles que están afectadas son 12.1.0.2, 12.2.0.1 y 19c. Una vulnerabilidad difícil de explotar permite a un atacante no autenticado con acceso a la red por medio de Oracle Net comprometer a advanced Networking Option. Los ataques con éxito requieren una interacción humana de una persona diferente del atacante y, mientras la vulnerabilidad se encuentra en Advanced Networking Option, los ataques pueden afectar significativamente a productos adicionales. Los ataques con éxito de esta vulnerabilidad pueden resultar en la toma de control de Advanced Networking Option. Nota: La actualización de parches críticos de julio de 2021 introduce una serie de cambios en el Cifrado de Red Nativo para hacer frente a la vulnerabilidad (CVE-2021-2351 y prevenir el uso de cifrados más débiles. Los clientes deben revisar: \"Changes in Native Network Encryption with the July 2021 Critical Patch Update\" (Doc ID 2791571.1). CVSS 3.1 Puntuación Base 8.3 (Impactos en la Confidencialidad, Integridad y Disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)",
               },
            ],
            id: "CVE-2021-2351",
            lastModified: "2024-02-16T18:48:45.617",
            metrics: {
               cvssMetricV2: [
                  {
                     acInsufInfo: false,
                     baseSeverity: "MEDIUM",
                     cvssData: {
                        accessComplexity: "HIGH",
                        accessVector: "NETWORK",
                        authentication: "NONE",
                        availabilityImpact: "PARTIAL",
                        baseScore: 5.1,
                        confidentialityImpact: "PARTIAL",
                        integrityImpact: "PARTIAL",
                        vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P",
                        version: "2.0",
                     },
                     exploitabilityScore: 4.9,
                     impactScore: 6.4,
                     obtainAllPrivilege: false,
                     obtainOtherPrivilege: false,
                     obtainUserPrivilege: false,
                     source: "nvd@nist.gov",
                     type: "Primary",
                     userInteractionRequired: true,
                  },
               ],
               cvssMetricV31: [
                  {
                     cvssData: {
                        attackComplexity: "HIGH",
                        attackVector: "NETWORK",
                        availabilityImpact: "HIGH",
                        baseScore: 8.3,
                        baseSeverity: "HIGH",
                        confidentialityImpact: "HIGH",
                        integrityImpact: "HIGH",
                        privilegesRequired: "NONE",
                        scope: "CHANGED",
                        userInteraction: "REQUIRED",
                        vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
                        version: "3.1",
                     },
                     exploitabilityScore: 1.6,
                     impactScore: 6,
                     source: "secalert_us@oracle.com",
                     type: "Primary",
                  },
                  {
                     cvssData: {
                        attackComplexity: "HIGH",
                        attackVector: "NETWORK",
                        availabilityImpact: "HIGH",
                        baseScore: 7.5,
                        baseSeverity: "HIGH",
                        confidentialityImpact: "HIGH",
                        integrityImpact: "HIGH",
                        privilegesRequired: "NONE",
                        scope: "UNCHANGED",
                        userInteraction: "REQUIRED",
                        vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        version: "3.1",
                     },
                     exploitabilityScore: 1.6,
                     impactScore: 5.9,
                     source: "nvd@nist.gov",
                     type: "Secondary",
                  },
               ],
            },
            published: "2021-07-21T15:15:21.827",
            references: [
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Exploit",
                     "Third Party Advisory",
                     "VDB Entry",
                  ],
                  url: "http://packetstormsecurity.com/files/165255/Oracle-Database-Protection-Mechanism-Bypass.html",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Exploit",
                     "Third Party Advisory",
                     "VDB Entry",
                  ],
                  url: "http://packetstormsecurity.com/files/165258/Oracle-Database-Weak-NNE-Integrity-Key-Derivation.html",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Exploit",
                     "Mailing List",
                     "Third Party Advisory",
                  ],
                  url: "http://seclists.org/fulldisclosure/2021/Dec/19",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Exploit",
                     "Mailing List",
                     "Third Party Advisory",
                  ],
                  url: "http://seclists.org/fulldisclosure/2021/Dec/20",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Patch",
                     "Vendor Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Patch",
                     "Vendor Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2022.html",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Vendor Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2023.html",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Patch",
                     "Vendor Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujul2021.html",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Vendor Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujul2022.html",
               },
               {
                  source: "secalert_us@oracle.com",
                  tags: [
                     "Patch",
                     "Vendor Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
            ],
            sourceIdentifier: "secalert_us@oracle.com",
            vulnStatus: "Analyzed",
            weaknesses: [
               {
                  description: [
                     {
                        lang: "en",
                        value: "CWE-327",
                     },
                     {
                        lang: "en",
                        value: "CWE-384",
                     },
                  ],
                  source: "nvd@nist.gov",
                  type: "Primary",
               },
            ],
         },
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.