{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T13:05:19.941","vulnerabilities":[{"cve":{"id":"CVE-2018-1258","sourceIdentifier":"security_alert@emc.com","published":"2018-05-11T20:29:00.260","lastModified":"2024-11-21T03:59:28.953","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted."},{"lang":"es","value":"La versión 5.0.5 de Spring Framework, cuando se utiliza en combinación con cualquier versión de Spring Security, contiene un omisión de autorización cuando se utiliza la seguridad del método. Un usuario malicioso no autorizado puede obtener acceso no autorizado a métodos que deben ser restringidos."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"AND","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:spring_security:*:*:*:*:*:*:*:*","matchCriteriaId":"82F4C00B-9F3D-46D2-B10A-204BD055BA5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_framework:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"1733D2EB-D792-4566-92BF-DD9EA301B2A2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*","matchCriteriaId":"D14ABF04-E460-4911-9C6C-B7BCEFE68E9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:agile_plm:9.3.4:*:*:*:*:*:*:*","matchCriteriaId":"CCF62B0C-A8BD-40E6-9E4E-E684F4E87ACD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*","matchCriteriaId":"ED43772F-D280-42F6-A292-7198284D6FE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*","matchCriteriaId":"C650FEDB-E903-4C2D-AD40-282AB5F2E3C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_testing_suite:10.1:*:*:*:*:*:*:*","matchCriteriaId":"54634303-BC07-41EF-8C4A-D64D9A32A40E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"17EA8B91-7634-4636-B647-1049BA7CA088"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"5B4DF46F-DBCC-41F2-A260-F83A14838F23"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"10F17843-32EA-4C31-B65C-F424447BEF7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"A125E817-F974-4509-872C-B71933F42AD1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:big_data_discovery:1.6.0:*:*:*:*:*:*:*","matchCriteriaId":"00280604-1DC1-4974-BF73-216C5D76FFA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0.0.1","matchCriteriaId":"EC361999-AAD8-4CB3-B00E-E3990C3529B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*","versionEndExcluding":"8.3","matchCriteriaId":"CF5A0F0D-313D-4F5C-AD6D-8C118D5CD8D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3.2","versionEndIncluding":"7.3.6","matchCriteriaId":"ABD748C9-24F6-4739-9772-208B98616EE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*","versionEndExcluding":"10.2.1","matchCriteriaId":"468931C8-C76A-4E47-BF00-185D85F719C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_services_gatekeeper:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.0.4.0","matchCriteriaId":"97C1FA4C-5163-420C-A01A-EA36F1039BBB"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.1.0:*:*:*:*:*:*:*","matchCriteriaId":"8B65CD29-C729-42AC-925E-014BA19581E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*","matchCriteriaId":"7E856B4A-6AE7-4317-921A-35B4D2048652"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterprise_manager_for_mysql_database:13.2:*:*:*:*:*:*:*","matchCriteriaId":"51C25F23-6800-48A2-881C-C2A2C3FA045C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*","matchCriteriaId":"BE12B6A4-E128-41EC-8017-558F50B961BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","matchCriteriaId":"AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterprise_repository:11.1.1.7.0:*:*:*:*:*:*:*","matchCriteriaId":"69300B13-8C0F-4433-A6E8-B2CE32C4723D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterprise_repository:12.1.3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"F9E13DD9-F456-4802-84AD-A2A1F12FE999"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:goldengate_for_big_data:12.2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1C4A89F2-713D-4A36-9D28-22748D30E0FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:goldengate_for_big_data:12.3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"CDFABB2C-2FA2-4F83-985B-7FCEAF274418"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:goldengate_for_big_data:12.3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"6A609003-8687-40B4-8AC3-06A1534ADE30"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:health_sciences_information_manager:3.0:*:*:*:*:*:*:*","matchCriteriaId":"9027528A-4FE7-4E3C-B2DF-CCCED22128F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:healthcare_master_person_index:3.0:*:*:*:*:*:*:*","matchCriteriaId":"2A699D02-296B-411E-9658-5893240605D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:healthcare_master_person_index:4.0:*:*:*:*:*:*:*","matchCriteriaId":"7036576C-2B1F-413D-B154-2DBF9BFDE7E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"1A3DC116-2844-47A1-BEC2-D0675DD97148"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"E0F1DF3E-0F2D-4EFC-9A3E-F72149C8AE94"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_calculation_engine:10.1.1:*:*:*:*:*:*:*","matchCriteriaId":"CEE4B2F0-1AAB-4A1F-AE86-A568D43891B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_calculation_engine:10.2:*:*:*:*:*:*:*","matchCriteriaId":"641D134E-6C51-4DB8-8554-F6B5222EF479"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_calculation_engine:10.2.1:*:*:*:*:*:*:*","matchCriteriaId":"C79B50C2-27C2-4A9C-ACEE-B70015283F58"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration:10.0:*:*:*:*:*:*:*","matchCriteriaId":"9ED4F724-C92F-4B4F-B631-81A4EA706DB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration:10.1:*:*:*:*:*:*:*","matchCriteriaId":"900450EB-A71D-4A8E-B8C4-AFD36F9A36B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration:10.2:*:*:*:*:*:*:*","matchCriteriaId":"68017B52-6597-4E32-A38F-634B5635568C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration:11.0:*:*:*:*:*:*:*","matchCriteriaId":"A19D11A6-BA1D-4121-8686-C177C450777F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:10.0:*:*:*:*:*:*:*","matchCriteriaId":"DB6321F8-7A0A-4DB8-9889-3527023C652A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:10.1:*:*:*:*:*:*:*","matchCriteriaId":"25F8E604-8180-4728-AD2D-7FF034E3E65A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:10.2:*:*:*:*:*:*:*","matchCriteriaId":"02867DC7-E669-43C0-ACC4-E1CAA8B9994C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FBAFA631-C92B-4FF7-8E65-07C67789EBCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:11.1:*:*:*:*:*:*:*","matchCriteriaId":"9652104A-119D-4327-A937-8BED23C23861"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:micros_lucas:2.9.5:*:*:*:*:*:*:*","matchCriteriaId":"98EE20FD-3D21-4E23-95B8-7BD13816EB95"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*","versionEndIncluding":"8.0.2.8191","matchCriteriaId":"1D863326-7106-4A08-9072-C72029584403"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_enterprise_fin_install:9.2:*:*:*:*:*:*:*","matchCriteriaId":"B21E71BD-DD38-4634-BF9F-092D55000DE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_assortment_planning:14.1:*:*:*:*:*:*:*","matchCriteriaId":"921B7906-A20A-4313-9398-D542A4198BBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:*","matchCriteriaId":"D09C6958-DD7C-4B43-B7F0-4EE65ED5B582"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_assortment_planning:16.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBFE031-4BD1-4501-AC62-DC0AFC2167B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_back_office:14.0:*:*:*:*:*:*:*","matchCriteriaId":"31C7EEA3-AA72-48DA-A112-2923DBB37773"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*","matchCriteriaId":"F0735989-13BD-40B3-B954-AC0529C5B53D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_central_office:14.0:*:*:*:*:*:*:*","matchCriteriaId":"83B5F416-56AE-4DC5-BCFF-49702463E716"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*","matchCriteriaId":"58405263-E84C-4071-BB23-165D49034A00"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:*","matchCriteriaId":"AD4AB77A-E829-4603-AF6A-97B9CD0D687F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:*","matchCriteriaId":"6DE15D64-6F49-4F43-8079-0C7827384C86"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:13.2:*:*:*:*:*:*:*","matchCriteriaId":"ACB5604C-69AF-459D-A82D-8A3B78CF2655"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:14.0:*:*:*:*:*:*:*","matchCriteriaId":"655CF3AE-B649-4282-B727-8B3C5D829C40"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:14.1:*:*:*:*:*:*:*","matchCriteriaId":"53CFE454-3E73-4A88-ABEE-322139B169A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:15.0:*:*:*:*:*:*:*","matchCriteriaId":"457C8C66-FB0C-4532-9027-8777CF42D17A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:16.0:*:*:*:*:*:*:*","matchCriteriaId":"FF2B9DA6-2937-4574-90DF-09FD770B23D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_integration_bus:14.1.2:*:*:*:*:*:*:*","matchCriteriaId":"20357086-0C32-44B5-A1FA-79283E88FB47"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_point-of-service:14.0:*:*:*:*:*:*:*","matchCriteriaId":"237968A4-AE89-44DC-8BA3-D9651F88883D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*","matchCriteriaId":"E13DF2AE-F315-4085-9172-6C8B21AF1C9E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_returns_management:14.0:*:*:*:*:*:*:*","matchCriteriaId":"959316A8-C3AF-4126-A242-3835ED0AD1E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*","matchCriteriaId":"BDB925C6-2CBC-4D88-B9EA-F246F4F7A206"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*","matchCriteriaId":"55AE3629-4A66-49E4-A33D-6D81CC94962F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:service_architecture_leveraging_tuxedo:12.1.3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"909A7F73-0164-471B-8EBD-1F70072E9809"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:service_architecture_leveraging_tuxedo:12.2.2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"2CE08DC9-5153-48D6-B23C-68A632FF8FF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:tape_library_acsls:8.4:*:*:*:*:*:*:*","matchCriteriaId":"70D4467D-6968-4557-AF61-AFD42B2B48D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:weblogic_server:10.3.6.0:*:*:*:*:*:*:*","matchCriteriaId":"0ABB9BAD-9BBD-4B2D-A0ED-7898812B9446"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:weblogic_server:12.1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"F745235C-55A9-4353-A4CB-4B7834BDD63F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:weblogic_server:12.2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"DAE3D682-1434-4789-8B43-679AE86533FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:*","matchCriteriaId":"CBFF04EF-B1C3-4601-878A-35EA6A15EF0C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","matchCriteriaId":"F1BE6C1F-2565-4E97-92AA-16563E5660A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","versionStartIncluding":"7.3","matchCriteriaId":"6AADE2A6-B78C-4B9C-8FAB-58DB50F69D84"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","versionStartIncluding":"9.4","matchCriteriaId":"7E49ACFC-FD48-4ED7-86E8-68B5B753852C"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","matchCriteriaId":"5735E553-9731-4AAC-BCFF-989377F817B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","matchCriteriaId":"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*","matchCriteriaId":"7B7A6697-98CC-4E36-93DB-B7160F8399F9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:fuse:7.3.0:*:*:*:*:*:*:*","matchCriteriaId":"407B62F8-F1D8-403D-B342-9EF06D6F128B"}]}]}],"references":[{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/104222","source":"security_alert@emc.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041888","source":"security_alert@emc.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041896","source":"security_alert@emc.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2019:2413","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://pivotal.io/security/cve-2018-1258","source":"security_alert@emc.com","tags":["Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20181018-0002/","source":"security_alert@emc.com","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuapr2020.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2020.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2021.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/104222","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041888","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041896","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2019:2413","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://pivotal.io/security/cve-2018-1258","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20181018-0002/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuapr2020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}