{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T21:05:33.038","vulnerabilities":[{"cve":{"id":"CVE-2019-17566","sourceIdentifier":"security@apache.org","published":"2020-11-12T18:15:12.567","lastModified":"2024-11-21T04:32:32.617","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the \"xlink:href\" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests."},{"lang":"es","value":"Apache Batik es vulnerable a un ataque de tipo server-side request forgery, causada por una comprobación inapropiada de la entrada por parte de los atributos \"xlink:href\".&#xa0;Al utilizar un argumento especialmente diseñado, un atacante podría explotar esta vulnerabilidad para causar que el servidor subyacente realice peticiones GET arbitrarias"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:batik:*:*:*:*:*:*:*:*","versionEndExcluding":"1.13","matchCriteriaId":"8A950107-C093-47B9-81A8-0EB3BEF2671E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:api_gateway:11.1.2.4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5553591-073B-45E3-999F-21B8BA2EEE22"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"D40AD626-B23A-44A3-A6C0-1FFB4D647AE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"B602F9E8-1580-436C-A26D-6E6F8121A583"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"77C3DD16-1D81-40E1-B312-50FBD275507C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"81DAC8C0-D342-44B5-9432-6B88D389584F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_application_session_controller:3.9m0p2:*:*:*:*:*:*:*","matchCriteriaId":"307AD099-8DCA-41D2-A2E8-B54C8963D820"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_metasolv_solution:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3.0","versionEndIncluding":"6.3.1","matchCriteriaId":"C55B9382-6FFE-46DF-AD75-16FABFA37229"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*","matchCriteriaId":"49ACFC73-A509-4D1C-8FC3-F68F495AB055"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterprise_repository:11.1.1.7.0:*:*:*:*:*:*:*","matchCriteriaId":"69300B13-8C0F-4433-A6E8-B2CE32C4723D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.6","versionEndIncluding":"8.1.0","matchCriteriaId":"021014B2-DC51-481C-BCFE-5857EFBDEDDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*","matchCriteriaId":"EA86EF7E-6162-4244-9C88-7AF5CAB787E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_opera_5:5.5:*:*:*:*:*:*:*","matchCriteriaId":"A1817C30-7B0B-441A-9567-B8DD7C6E646C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_opera_5:5.6:*:*:*:*:*:*:*","matchCriteriaId":"95D6A426-B914-401F-9AB0-5F5E3A3FE138"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hyperion_financial_reporting:11.1.2.4:*:*:*:*:*:*:*","matchCriteriaId":"0A6675A3-684B-4486-A451-C6688F1C821B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hyperion_financial_reporting:11.2.5.0:*:*:*:*:*:*:*","matchCriteriaId":"B321C982-EB68-4160-95DB-590CF8BB6727"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*","versionStartIncluding":"17.1","versionEndIncluding":"17.3","matchCriteriaId":"9A74FD5F-4FEA-4A74-8B92-72DFDE6BA464"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*","versionEndExcluding":"9.2.4.0","matchCriteriaId":"D47FCCD9-73F5-4BBC-9456-EED314AFC3C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.4.2:*:*:*:*:*:*:*","matchCriteriaId":"9BB4E4AF-DD15-470D-B437-5913BFFD97E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_integration_bus:15.0.3:*:*:*:*:*:*:*","matchCriteriaId":"FA800332-C6B9-4F05-9FB0-72C1040AAFD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*","matchCriteriaId":"EE8CF045-09BB-4069-BCEC-496D5AE3B780"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*","matchCriteriaId":"38E74E68-7F19-4EF3-AC00-3C249EAAA39E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_order_management_system_cloud_service:19.5:*:*:*:*:*:*:*","matchCriteriaId":"A0C02FB5-59A0-43BC-B3DA-2BB1A1BE5CC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*","matchCriteriaId":"E13DF2AE-F315-4085-9172-6C8B21AF1C9E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*","matchCriteriaId":"BDB925C6-2CBC-4D88-B9EA-F246F4F7A206"}]}]}],"references":[{"url":"https://lists.apache.org/thread.html/rab94fe68b180d2e2fba97abf6fe1ec83cff826be25f86cd90f047171%40%3Ccommits.myfaces.apache.org%3E","source":"security@apache.org"},{"url":"https://lists.apache.org/thread.html/rcab14a9ec91aa4c151e0729966282920423eff50a22759fd21db6509%40%3Ccommits.myfaces.apache.org%3E","source":"security@apache.org"},{"url":"https://security.gentoo.org/glsa/202401-11","source":"security@apache.org"},{"url":"https://www.oracle.com//security-alerts/cpujul2021.html","source":"security@apache.org","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuApr2021.html","source":"security@apache.org","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2021.html","source":"security@apache.org","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2022.html","source":"security@apache.org","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","source":"security@apache.org","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","source":"security@apache.org","tags":["Patch","Third Party Advisory"]},{"url":"https://xmlgraphics.apache.org/security.html","source":"security@apache.org","tags":["Vendor Advisory"]},{"url":"https://lists.apache.org/thread.html/rab94fe68b180d2e2fba97abf6fe1ec83cff826be25f86cd90f047171%40%3Ccommits.myfaces.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rcab14a9ec91aa4c151e0729966282920423eff50a22759fd21db6509%40%3Ccommits.myfaces.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.gentoo.org/glsa/202401-11","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.oracle.com//security-alerts/cpujul2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuApr2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujan2022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://xmlgraphics.apache.org/security.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}