{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T12:53:42.378","vulnerabilities":[{"cve":{"id":"CVE-2018-15756","sourceIdentifier":"security_alert@emc.com","published":"2018-10-18T22:29:00.443","lastModified":"2024-11-21T03:51:24.640","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable."},{"lang":"es","value":"Spring Framework 5.1, versiones 5.0.x anteriores a la 5.0.10, versiones 4.3.x anteriores a la 4.3.20 y versiones anteriores no soportadas en la rama de versiones 4.2.x proporciona soporte para peticiones de rango al servir recursos estáticos mediante ResourceHttpRequestHandler o, desde la versión 5.0, cuando un controlador anotado devuelve org.springframework.core.io.Resource. Un usuario (o atacante) malicioso puede añadir una cabecera de rango con un alto número de rangos o con rangos amplios que se superponen, o ambos, para provocar un ataque de denegación de servicio (DoS). Esta vulnerabilidad afecta a aplicaciones que dependen de spring-webmvc o spring-webflux. Tales aplicaciones también deben tener un registro para servir recursos estáticos (JS, CSS, imágenes y otros) o tener un controlador anotado que devuelve org.springframework.core.io.Resource. Las aplicaciones Spring Boot que dependen de spring-boot-starter-web o spring-boot-starter-webflux están preparadas para servir recursos estáticos de fábrica y son, por lo tanto, vulnerables."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security_alert@emc.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2.0","versionEndExcluding":"4.3.20","matchCriteriaId":"338FFBAA-44A3-4E69-8E07-BD3929C1983B"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.0.10","matchCriteriaId":"B61BC961-CB33-4FE9-9988-E0820DF7EFC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:spring_framework:5.1.0:*:*:*:*:*:*:*","matchCriteriaId":"C75A3E59-EBDF-4734-8297-0FDD75CEA731"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*","matchCriteriaId":"D14ABF04-E460-4911-9C6C-B7BCEFE68E9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:agile_plm:9.3.4:*:*:*:*:*:*:*","matchCriteriaId":"CCF62B0C-A8BD-40E6-9E4E-E684F4E87ACD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*","matchCriteriaId":"ED43772F-D280-42F6-A292-7198284D6FE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*","matchCriteriaId":"C650FEDB-E903-4C2D-AD40-282AB5F2E3C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*","matchCriteriaId":"512E0604-4D40-49CE-8142-89379A226913"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*","matchCriteriaId":"F5726AE4-4F63-4793-8948-0546DAA2D50D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.0:*:*:*:*:*:*:*","matchCriteriaId":"E5BF676D-EBA7-4CF8-BB36-C71B5502F04C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.1:*:*:*:*:*:*:*","matchCriteriaId":"66DCCCD9-2170-4675-A447-FB679BC28A74"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*","matchCriteriaId":"A9317C01-22AA-452B-BBBF-5FAFFFB8BEA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*","matchCriteriaId":"C4534CF9-D9FD-4936-9D8C-077387028A05"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*","matchCriteriaId":"D60384BD-284C-4A68-9EEF-0FAFDF0C21F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FCA44E38-EB8C-4E2D-8611-B201F47520E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*","matchCriteriaId":"0C57FD3A-0CC1-4BA9-879A-8C4A40234162"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*","matchCriteriaId":"698FB6D0-B26F-4760-9B9B-1C65FBFF2126"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"4F1D64BC-17BF-4DAE-B5FC-BC41F9C12DFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_online_mediation_controller:6.1:*:*:*:*:*:*:*","matchCriteriaId":"15817206-C2AD-47B7-B40F-85BB36DB4E78"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*","matchCriteriaId":"7DDF6809-53A7-4F7D-9FA8-B522BE8F7A21"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*","matchCriteriaId":"AA86A15F-FAB8-4DF5-95AC-DA3D1CF7A720"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*","matchCriteriaId":"DB43DFD4-D058-4001-BD19-488E059F4532"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*","matchCriteriaId":"086E2E5C-44EB-4C07-B298-C04189533996"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"AA77B994-3872-4059-854B-0974AA5593D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*","matchCriteriaId":"4B042935-BC42-4CA8-9379-7F0F894F9653"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*","matchCriteriaId":"3B374F86-4EC8-4797-A8C3-5C1FF1DFC9F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*","matchCriteriaId":"5682DAEB-3810-4541-833A-568C868BCE0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*","matchCriteriaId":"01BC9AED-F81D-4344-AD97-EEF19B6EA8C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"8198E762-9AD9-452B-B1AF-516E52436B7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3:*:*:*:*:*:*:*","matchCriteriaId":"D0D177F6-25D9-4696-8528-3F57D91BAC12"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*","matchCriteriaId":"539DA24F-E3E0-4455-84C6-A9D96CD601B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*","matchCriteriaId":"7E856B4A-6AE7-4317-921A-35B4D2048652"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterprise_manager_for_fusion_applications:13.3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"941E3CB6-013B-4AD4-8D36-2254E6D3C2F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","matchCriteriaId":"AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.2","versionEndIncluding":"8.0.8","matchCriteriaId":"51433748-DED0-416D-8BFE-F3493E13772E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:flexcube_private_banking:12.0.1:*:*:*:*:*:*:*","matchCriteriaId":"11CCF1EE-70D3-40C9-9797-AE6228DA8522"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:flexcube_private_banking:12.0.3:*:*:*:*:*:*:*","matchCriteriaId":"50FF641E-E2E8-4641-B7BC-FF862B39EDB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*","matchCriteriaId":"1B74B912-152D-4F38-9FC1-741D6D0B27FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"F6F259E6-10A8-4207-8FC2-85ABD70B04C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:healthcare_master_person_index:3.0:*:*:*:*:*:*:*","matchCriteriaId":"2A699D02-296B-411E-9658-5893240605D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:healthcare_master_person_index:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"4CC97EF4-DAB5-4A4C-B5DF-5AD2BF87DDB0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:identity_manager_connector:9.0:*:*:*:*:*:*:*","matchCriteriaId":"E8BD581B-1CC0-4236-836A-204BBCBBBF77"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_calculation_engine:9.7:*:*:*:*:*:*:*","matchCriteriaId":"194DC2C7-92DA-4EC1-BCD5-05C67D4A4781"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_calculation_engine:10.0:*:*:*:*:*:*:*","matchCriteriaId":"43839DCD-ACA1-4205-90D6-A38CE3005862"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_calculation_engine:10.1:*:*:*:*:*:*:*","matchCriteriaId":"C05CDCFE-78CE-46B2-91DB-B88816E2267F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_calculation_engine:10.2:*:*:*:*:*:*:*","matchCriteriaId":"641D134E-6C51-4DB8-8554-F6B5222EF479"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.0:*:*:*:*:*:*:*","matchCriteriaId":"DC3BC82E-4780-4D10-B424-6CD9EFD0F2C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.1:*:*:*:*:*:*:*","matchCriteriaId":"17347180-9343-4E4C-8B81-7E3AB4CFE255"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2:*:*:*:*:*:*:*","matchCriteriaId":"12047B25-F234-4562-9943-63E47EF32684"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"64D4B80E-2B67-4BDC-9A3A-7BFDA171016A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"33E0F28C-1FF3-4E12-AAE4-A765F4F81EC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0:*:*:*:*:*:*:*","matchCriteriaId":"10C2E4A0-4E60-4A00-AA60-392A65AC0BB9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"991B23C1-83FA-40B1-AF0A-9A7B10A9EDA1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"D56B4193-4DB7-4BD9-85FF-8665601E6D4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:10.0:*:*:*:*:*:*:*","matchCriteriaId":"DB6321F8-7A0A-4DB8-9889-3527023C652A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:10.1:*:*:*:*:*:*:*","matchCriteriaId":"25F8E604-8180-4728-AD2D-7FF034E3E65A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:10.2:*:*:*:*:*:*:*","matchCriteriaId":"02867DC7-E669-43C0-ACC4-E1CAA8B9994C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*","matchCriteriaId":"AEDF91E2-E7B5-40EE-B71F-C7D59F4021BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*","matchCriteriaId":"9A94F93C-5828-4D78-9C48-20AC17E72B8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FBAFA631-C92B-4FF7-8E65-07C67789EBCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*","matchCriteriaId":"F3E25293-CB03-44CE-A8ED-04B3A0487A6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:11.1.0:*:*:*:*:*:*:*","matchCriteriaId":"4F9721E3-EE25-4C8A-9E0A-E60D465E0A97"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:insurance_rules_palette:11.2.0:*:*:*:*:*:*:*","matchCriteriaId":"E08D8FE6-2BB4-4FF6-8B42-2D47F6FBFDFA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0.12","matchCriteriaId":"9A3BBE71-CA00-4F54-9210-FC7572C87CFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndIncluding":"8.0.20","matchCriteriaId":"73573516-EDA0-4176-A3ED-2F7006C87F8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_analytics:18.8:*:*:*:*:*:*:*","matchCriteriaId":"39E75BF4-8F7B-4D56-908A-4F73E35C0905"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:*","matchCriteriaId":"6CBFA960-D242-43ED-8D4C-A60F01B70740"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:*","matchCriteriaId":"0513B305-97EF-4609-A82E-D0CDFF9925BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:*","matchCriteriaId":"61A7F6E0-A4A4-4FC3-90CB-156933CB3B9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:primavera_gateway:18.8.0:*:*:*:*:*:*:*","matchCriteriaId":"99365245-49E8-4616-BD24-CE564AC1D17E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*","matchCriteriaId":"19A0F1AF-F2E6-44E7-8E2D-190E103B72D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*","matchCriteriaId":"6D53690D-3390-4A27-988A-709CD89DD05B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_advanced_inventory_planning:15.0:*:*:*:*:*:*:*","matchCriteriaId":"517E0654-F1DE-43C4-90B5-FB90CA31734B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:*","matchCriteriaId":"D09C6958-DD7C-4B43-B7F0-4EE65ED5B582"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_assortment_planning:16.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBFE031-4BD1-4501-AC62-DC0AFC2167B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0.5:*:*:*:*:*:*:*","matchCriteriaId":"FE91D517-D85D-4A8D-90DC-4561BBF8670E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:14.0:*:*:*:*:*:*:*","matchCriteriaId":"655CF3AE-B649-4282-B727-8B3C5D829C40"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:14.1:*:*:*:*:*:*:*","matchCriteriaId":"53CFE454-3E73-4A88-ABEE-322139B169A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:15.0:*:*:*:*:*:*:*","matchCriteriaId":"457C8C66-FB0C-4532-9027-8777CF42D17A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_financial_integration:16.0:*:*:*:*:*:*:*","matchCriteriaId":"FF2B9DA6-2937-4574-90DF-09FD770B23D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_integration_bus:15.0:*:*:*:*:*:*:*","matchCriteriaId":"42064F46-3012-4FB1-89BA-F13C2E4CBB6B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_integration_bus:15.0.3:*:*:*:*:*:*:*","matchCriteriaId":"FA800332-C6B9-4F05-9FB0-72C1040AAFD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_integration_bus:16.0:*:*:*:*:*:*:*","matchCriteriaId":"F73E2EFA-0F43-4D92-8C7D-9E66811B76D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*","matchCriteriaId":"822A3C37-86F2-4E91-BE91-2A859F983941"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_invoice_matching:12.0:*:*:*:*:*:*:*","matchCriteriaId":"51D1FAEE-65FD-47EB-9F4D-505C72000F3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_invoice_matching:13.0:*:*:*:*:*:*:*","matchCriteriaId":"4C45FF05-FB76-4782-891E-F4A8A4871A22"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_invoice_matching:13.1:*:*:*:*:*:*:*","matchCriteriaId":"5C03ED7B-3826-4D6D-89C5-61DE12E27213"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_invoice_matching:13.2:*:*:*:*:*:*:*","matchCriteriaId":"8893CB1D-F18C-404D-BC06-CA2617BFAE58"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_invoice_matching:14.0:*:*:*:*:*:*:*","matchCriteriaId":"42227DD8-6671-4B38-9E42-4ACF78F09C97"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_invoice_matching:14.1:*:*:*:*:*:*:*","matchCriteriaId":"69962BD9-A102-4621-9461-018E87261657"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_markdown_optimization:13.4.4:*:*:*:*:*:*:*","matchCriteriaId":"B05A34B4-A853-456C-BD56-3B3FD6397424"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_order_broker:5.1:*:*:*:*:*:*:*","matchCriteriaId":"EAA4DF85-9225-4422-BF10-D7DAE7DCE007"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*","matchCriteriaId":"77C2A2A4-285B-40A1-B9AD-42219D742DD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*","matchCriteriaId":"EE8CF045-09BB-4069-BCEC-496D5AE3B780"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*","matchCriteriaId":"38E74E68-7F19-4EF3-AC00-3C249EAAA39E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_predictive_application_server:14.0.3:*:*:*:*:*:*:*","matchCriteriaId":"118E48CE-8603-442B-B9C9-E30A41E4D974"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_predictive_application_server:14.0.3.26:*:*:*:*:*:*:*","matchCriteriaId":"6A17D989-66AC-4A17-AB4D-E0EC045FB457"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3:*:*:*:*:*:*:*","matchCriteriaId":"6B1A4F12-3E64-41CF-B2B3-B6AB734B69E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3.37:*:*:*:*:*:*:*","matchCriteriaId":"14285308-8564-4858-8D31-E40E57B27390"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*","matchCriteriaId":"24A3C819-5151-4543-A5C6-998C9387C8A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3.100:*:*:*:*:*:*:*","matchCriteriaId":"A1C4C280-B319-411B-8510-9B5319E6D312"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_predictive_application_server:16.0:*:*:*:*:*:*:*","matchCriteriaId":"21973CDD-D16E-4321-9F8E-67F4264D7C21"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*","matchCriteriaId":"4FB98961-8C99-4490-A6B8-9A5158784F5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*","matchCriteriaId":"363395FA-C296-4B2B-9D6F-BCB8DBE6FACE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*","matchCriteriaId":"F62A2144-5EF8-4319-B8C2-D7975F51E5FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_service_backbone:16.0.1:*:*:*:*:*:*:*","matchCriteriaId":"CA3D85CE-DAE9-418A-AA94-779546C0D245"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*","matchCriteriaId":"A0ED83E3-E6BF-4EAA-AF8F-33485A88A218"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:tape_library_acsls:8.5:*:*:*:*:*:*:*","matchCriteriaId":"162C6FD9-AEC2-4EBA-A163-3054840B8ACE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"D551CAB1-4312-44AA-BDA8-A030817E153A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*","matchCriteriaId":"B40B13B7-68B3-4510-968C-6A730EB46462"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"C93CC705-1F8C-4870-99E6-14BF264C3811"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"F14A818F-AA16-4438-A3E4-E64C9287AC66"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*","matchCriteriaId":"4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","matchCriteriaId":"DEECE5FC-CACF-4496-A3E7-164736409252"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105703","source":"security_alert@emc.com","tags":["Third Party Advisory","VDB Entry","URL Repurposed"]},{"url":"https://lists.apache.org/thread.html/339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.apache.org/thread.html/77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.apache.org/thread.html/7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.apache.org/thread.html/8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.apache.org/thread.html/a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.apache.org/thread.html/bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.apache.org/thread.html/d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.apache.org/thread.html/efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.apache.org/thread.html/f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc%40%3Cissues.activemq.apache.org%3E","source":"security_alert@emc.com"},{"url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html","source":"security_alert@emc.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://pivotal.io/security/cve-2018-15756","source":"security_alert@emc.com","tags":["Vendor Advisory"]},{"url":"https://www.oracle.com//security-alerts/cpujul2021.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuapr2020.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2020.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2021.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","source":"security_alert@emc.com","tags":["Not Applicable","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","source":"security_alert@emc.com","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","source":"security_alert@emc.com","tags":["Patch","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/105703","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry","URL Repurposed"]},{"url":"https://lists.apache.org/thread.html/339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc%40%3Cissues.activemq.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://pivotal.io/security/cve-2018-15756","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.oracle.com//security-alerts/cpujul2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuapr2020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}