<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="2967710.xsl"?>
<?xml-stylesheet type="text/css" href="2967708.css"?>
<cvrf:cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
   <DocumentTitle xml:lang="en">Oracle Critical Patch Update Advisory - July 2018 - Oracle CVRF</DocumentTitle>
   <DocumentType xml:lang="en">Oracle Critical Patch Update Advisory</DocumentType>
   <DocumentPublisher Type="Vendor"/>
   <DocumentTracking>
      <Identification>
         <ID>CPUJul2018</ID>
      </Identification>
      <Status>Final</Status>
      <Version>7.0</Version>
      <RevisionHistory>
         <Revision>
            <Number>7.0</Number>
            <Date>2018-09-18T13:00:00-07:00</Date>
            <Description>Updated credit for CVE-2018-2996.</Description>
         </Revision>
      </RevisionHistory>
      <InitialReleaseDate>2018-07-17T13:00:00-07:00</InitialReleaseDate>
      <CurrentReleaseDate>2018-09-18T13:00:00-07:00</CurrentReleaseDate>
   </DocumentTracking>
   <DocumentNotes>
      <Note Audience="All" Ordinal="1" Title="Summary" Type="Summary" xml:lang="en">This document contains descriptions of Oracle product security vulnerabilities which have had fixes released for all supported versions and platforms for the associated product.  Additional information regarding these vulnerabilities including fix distribution information can be found at the Oracle sites referenced in this document.</Note>
   </DocumentNotes>
   <DocumentDistribution>This document is published at: https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/4703578.xml</DocumentDistribution>
   <DocumentReferences>
      <Reference Type="External">
         <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
         <Description>URL to html version of Advisory</Description>
      </Reference>
   </DocumentReferences>
   <Acknowledgments>
      <Acknowledgment>
         <Name>Adam Willard</Name>
         <Organization>Adam Willard</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Add of MeePwn working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Amin Moralic</Name>
         <Organization>Pure Hacking</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>André Lenoir</Name>
         <Organization>Tehtris</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Anil Tom</Name>
         <Organization>Anil Tom</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Anonymous researcher working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Badcode</Name>
         <Organization>Knownsec 404 Team</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Bartłomiej Stasiek</Name>
         <Organization>Bartłomiej Stasiek</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Behzad Najjarpour Jabbari, Secunia Research at Flexera Software</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Elif Zehra Karabiber</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Zhong Zhaochen</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Cedric Zirtacic</Name>
         <Organization>Cedric Zirtacic</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Cem Onat Karagun</Name>
         <Organization>Cem Onat Karagun</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>0c0c0f</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Daniel Bleichenbacher of Google</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>David Litchfield</Name>
         <Organization>Apple</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Denis Andzakovic</Name>
         <Organization>Pulse Security</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dmitry Ivanov</Name>
         <Organization>Dmitry Ivanov</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Fabio Pires</Name>
         <Organization>NCC Group</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Faizal Hasanwala</Name>
         <Organization>Faizal Hasanwala</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Gregory Draperi</Name>
         <Organization>Gregory Draperi</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Gregory Smiley</Name>
         <Organization>Security Compass</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jackson Thuraisamy formerly of Security Compass</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jakub Palaczynski</Name>
         <Organization>ING Services Polska</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jamal Elfitory</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jayesh Patel</Name>
         <Organization>Jayesh Patel</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jayson Grace</Name>
         <Organization>Sandia National Laboratories</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jim LaValley, Towerwall, Inc.</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>John Beeson</Name>
         <Organization>Baker Hughes, a GE Company</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jose Carlos Exposito Bueno</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Kerem TAMCI</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jacob 'kobsoN' Hazak</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Krisorn Phochalam</Name>
         <Organization>Krisorn Phochalam</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Liao Xinxi</Name>
         <Organization>NSFOCUS Security Team</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lilei</Name>
         <Organization>Venustech ADLab</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Linpei Sheng</Name>
         <Organization>360 Enterprise Security Group</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lukasz Plonka</Name>
         <Organization>ING Services Polska</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Marcin Wołoszyn</Name>
         <Organization>ING Services Polska</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Mathew Nash</Name>
         <Organization>NCC Group</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Matthew E. Fulton</Name>
         <Organization>Matthew E. Fulton</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Matthew Fulton</Name>
         <Organization>Pure Hacking</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Mingxuan Song</Name>
         <Organization>CNCERT</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Mushraf Mustafa</Name>
         <Organization>Mushraf Mustafa</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Nalla Muthu</Name>
         <Organization>Nalla Muthu</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Nick Marcoccio @1oopho1e</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Nicolas Verdier</Name>
         <Organization>Tehtris</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Niklas Baumstark working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Omkar Avasthi</Name>
         <Organization>Hermit Wolf</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Pawan Patil</Name>
         <Organization>Electronic Arts</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Pawel Gocyla</Name>
         <Organization>Pawel Gocyla</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Rich Mirch</Name>
         <Organization>Rich Mirch</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Richard Cocks</Name>
         <Organization>Richard Cocks</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Rick Ramgattie</Name>
         <Organization>Rick Ramgattie</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Neil Kettle of Trustwave Spiderlabs</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Root Object working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sara Badran</Name>
         <Organization>Sara Badran</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dario Weißer</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lokesh Sharma</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sidney Markowitz</Name>
         <Organization>Sidney Markowitz</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Thomas Barabosch</Name>
         <Organization>Fraunhofer FKIE</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>TrendyTofu working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Viral Bhatt</Name>
         <Organization>Viral Bhatt</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Vishakh B</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Vismit Rakhecha</Name>
         <Organization>Vismit Rakhecha</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Xu Yuanzhen of Alibaba Cloud Security Team</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Youssef A. Mohamed aka GeneralEG</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>re4lity</Name>
         <Organization>Polaris Lab</Organization>
      </Acknowledgment>
   </Acknowledgments>
   <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
      <Branch Name="Oracle" Type="Vendor">
         <Branch Name="Oracle Communications Applications" Type="Product Family">
            <Branch Name="Communications Network Charging and Control" Type="Product Name">
               <Branch Name="4.4.1.5.0" Type="Product Version">
                  <FullProductName ProductID="P-4623V-4.4.1.5.0">Communications Network Charging and Control Version 4.4.1.5.0</FullProductName>
               </Branch>
               <Branch Name="5.0.0.1.0" Type="Product Version">
                  <FullProductName ProductID="P-4623V-5.0.0.1.0">Communications Network Charging and Control Version 5.0.0.1.0</FullProductName>
               </Branch>
               <Branch Name="5.0.0.2.0" Type="Product Version">
                  <FullProductName ProductID="P-4623V-5.0.0.2.0">Communications Network Charging and Control Version 5.0.0.2.0</FullProductName>
               </Branch>
               <Branch Name="5.0.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-4623V-5.0.1.0.0">Communications Network Charging and Control Version 5.0.1.0.0</FullProductName>
               </Branch>
               <Branch Name="5.0.2.0.0" Type="Product Version">
                  <FullProductName ProductID="P-4623V-5.0.2.0.0">Communications Network Charging and Control Version 5.0.2.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Convergence" Type="Product Name">
               <Branch Name="3.x" Type="Product Version">
                  <FullProductName ProductID="P-8501V-3.x">Communications Convergence Version 3.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Session Border Controller" Type="Product Name">
               <Branch Name="ECz7.x" Type="Product Version">
                  <FullProductName ProductID="P-10750V-ECz7.x">Communications Session Border Controller Version ECz7.x</FullProductName>
               </Branch>
               <Branch Name="ECz8.x" Type="Product Version">
                  <FullProductName ProductID="P-10750V-ECz8.x">Communications Session Border Controller Version ECz8.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Interactive Session Recorder" Type="Product Name">
               <Branch Name="5.x" Type="Product Version">
                  <FullProductName ProductID="P-10765V-5.x">Communications Interactive Session Recorder Version 5.x</FullProductName>
               </Branch>
               <Branch Name="6.x" Type="Product Version">
                  <FullProductName ProductID="P-10765V-6.x">Communications Interactive Session Recorder Version 6.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Diameter Signaling Router (DSR)" Type="Product Name">
               <Branch Name="7.x" Type="Product Version">
                  <FullProductName ProductID="P-10899V-7.x">Communications Diameter Signaling Router (DSR) Version 7.x</FullProductName>
               </Branch>
               <Branch Name="8.x" Type="Product Version">
                  <FullProductName ProductID="P-10899V-8.x">Communications Diameter Signaling Router (DSR) Version 8.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Policy Management" Type="Product Name">
               <Branch Name="12.x" Type="Product Version">
                  <FullProductName ProductID="P-10900V-12.x">Communications Policy Management Version 12.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications User Data Repository" Type="Product Name">
               <Branch Name="10.x" Type="Product Version">
                  <FullProductName ProductID="P-11108V-10.x">Communications User Data Repository Version 10.x</FullProductName>
               </Branch>
               <Branch Name="12.x" Type="Product Version">
                  <FullProductName ProductID="P-11108V-12.x">Communications User Data Repository Version 12.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications EAGLE LNP Application Processor" Type="Product Name">
               <Branch Name="10.x" Type="Product Version">
                  <FullProductName ProductID="P-11118V-10.x">Communications EAGLE LNP Application Processor Version 10.x</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Construction and Engineering Suite" Type="Product Family">
            <Branch Name="Primavera P6 Enterprise Project Portfolio Management" Type="Product Name">
               <Branch Name="15.x" Type="Product Version">
                  <FullProductName ProductID="P-5579V-15.x">Primavera P6 Enterprise Project Portfolio Management Version 15.x</FullProductName>
               </Branch>
               <Branch Name="16.x" Type="Product Version">
                  <FullProductName ProductID="P-5579V-16.x">Primavera P6 Enterprise Project Portfolio Management Version 16.x</FullProductName>
               </Branch>
               <Branch Name="17.x" Type="Product Version">
                  <FullProductName ProductID="P-5579V-17.x">Primavera P6 Enterprise Project Portfolio Management Version 17.x</FullProductName>
               </Branch>
               <Branch Name="8.4" Type="Product Version">
                  <FullProductName ProductID="P-5579V-8.4">Primavera P6 Enterprise Project Portfolio Management Version 8.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Primavera Unifier" Type="Product Name">
               <Branch Name="16.x" Type="Product Version">
                  <FullProductName ProductID="P-10354V-16.x">Primavera Unifier Version 16.x</FullProductName>
               </Branch>
               <Branch Name="17.x" Type="Product Version">
                  <FullProductName ProductID="P-10354V-17.x">Primavera Unifier Version 17.x</FullProductName>
               </Branch>
               <Branch Name="18.x" Type="Product Version">
                  <FullProductName ProductID="P-10354V-18.x">Primavera Unifier Version 18.x</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Database Server" Type="Product Family">
            <Branch Name="Oracle Database" Type="Product Name">
               <Branch Name="11.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-5V-11.2.0.4">Oracle Database Version 11.2.0.4</FullProductName>
               </Branch>
               <Branch Name="12.1.0.2" Type="Product Version">
                  <FullProductName ProductID="P-5V-12.1.0.2">Oracle Database Version 12.1.0.2</FullProductName>
               </Branch>
               <Branch Name="12.2.0.1" Type="Product Version">
                  <FullProductName ProductID="P-5V-12.2.0.1">Oracle Database Version 12.2.0.1</FullProductName>
               </Branch>
               <Branch Name="18.1" Type="Product Version">
                  <FullProductName ProductID="P-5V-18.1">Oracle Database Version 18.1</FullProductName>
               </Branch>
               <Branch Name="18.2" Type="Product Version">
                  <FullProductName ProductID="P-5V-18.2">Oracle Database Version 18.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Spatial and Graph" Type="Product Name">
               <Branch Name="12.2.0.1" Type="Product Version">
                  <FullProductName ProductID="P-619V-12.2.0.1">Spatial and Graph Version 12.2.0.1</FullProductName>
               </Branch>
               <Branch Name="18.1" Type="Product Version">
                  <FullProductName ProductID="P-619V-18.1">Spatial and Graph Version 18.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle E-Business Suite" Type="Product Family">
            <Branch Name="Applications Manager" Type="Product Name">
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-99V-12.1.3">Applications Manager Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-99V-12.2.3">Applications Manager Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-99V-12.2.4">Applications Manager Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-99V-12.2.5">Applications Manager Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-99V-12.2.6">Applications Manager Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-99V-12.2.7">Applications Manager Version 12.2.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Marketing" Type="Product Name">
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.1.1">Marketing Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.1.2">Marketing Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.1.3">Marketing Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.2.3">Marketing Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.2.4">Marketing Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.2.5">Marketing Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.2.6">Marketing Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.2.7">Marketing Version 12.2.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="iStore" Type="Product Name">
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-384V-12.1.1">iStore Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-384V-12.1.2">iStore Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-384V-12.1.3">iStore Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-384V-12.2.3">iStore Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-384V-12.2.4">iStore Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-384V-12.2.5">iStore Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-384V-12.2.6">iStore Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-384V-12.2.7">iStore Version 12.2.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Scripting" Type="Product Name">
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-433V-12.1.1">Scripting Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-433V-12.1.2">Scripting Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-433V-12.1.3">Scripting Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Order Management" Type="Product Name">
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-497V-12.1.1">Order Management Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-497V-12.1.2">Order Management Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-497V-12.1.3">Order Management Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-497V-12.2.3">Order Management Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-497V-12.2.4">Order Management Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-497V-12.2.5">Order Management Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-497V-12.2.6">Order Management Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-497V-12.2.7">Order Management Version 12.2.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Application Object Library" Type="Product Name">
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.1.3">Application Object Library Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Trade Management" Type="Product Name">
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-765V-12.1.1">Trade Management Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-765V-12.1.2">Trade Management Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-765V-12.1.3">Trade Management Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-765V-12.2.3">Trade Management Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-765V-12.2.4">Trade Management Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-765V-12.2.5">Trade Management Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-765V-12.2.6">Trade Management Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-765V-12.2.7">Trade Management Version 12.2.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="CRM Technical Foundation" Type="Product Name">
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.1.1">CRM Technical Foundation Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.1.2">CRM Technical Foundation Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.1.3">CRM Technical Foundation Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.2.3">CRM Technical Foundation Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.2.4">CRM Technical Foundation Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.2.5">CRM Technical Foundation Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.2.6">CRM Technical Foundation Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.2.7">CRM Technical Foundation Version 12.2.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="One-to-One Fulfillment" Type="Product Name">
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.1.1">One-to-One Fulfillment Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.1.2">One-to-One Fulfillment Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.1.3">One-to-One Fulfillment Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.2.3">One-to-One Fulfillment Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.2.4">One-to-One Fulfillment Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.2.5">One-to-One Fulfillment Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.2.6">One-to-One Fulfillment Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.2.7">One-to-One Fulfillment Version 12.2.7</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Enterprise Manager Products Suite" Type="Product Family">
            <Branch Name="Enterprise Manager for Oracle Database" Type="Product Name">
               <Branch Name="12.1.0.8" Type="Product Version">
                  <FullProductName ProductID="P-1366V-12.1.0.8">Enterprise Manager for Oracle Database Version 12.1.0.8</FullProductName>
               </Branch>
               <Branch Name="13.2.2" Type="Product Version">
                  <FullProductName ProductID="P-1366V-13.2.2">Enterprise Manager for Oracle Database Version 13.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager for Fusion Middleware" Type="Product Name">
               <Branch Name="12.1.0.5" Type="Product Version">
                  <FullProductName ProductID="P-1369V-12.1.0.5">Enterprise Manager for Fusion Middleware Version 12.1.0.5</FullProductName>
               </Branch>
               <Branch Name="13.2.x" Type="Product Version">
                  <FullProductName ProductID="P-1369V-13.2.x">Enterprise Manager for Fusion Middleware Version 13.2.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager Base Platform" Type="Product Name">
               <Branch Name="12.1.0.5" Type="Product Version">
                  <FullProductName ProductID="P-1370V-12.1.0.5">Enterprise Manager Base Platform Version 12.1.0.5</FullProductName>
               </Branch>
               <Branch Name="13.2.x" Type="Product Version">
                  <FullProductName ProductID="P-1370V-13.2.x">Enterprise Manager Base Platform Version 13.2.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager for Peoplesoft" Type="Product Name">
               <Branch Name="13.1.1.1" Type="Product Version">
                  <FullProductName ProductID="P-2131V-13.1.1.1">Enterprise Manager for Peoplesoft Version 13.1.1.1</FullProductName>
               </Branch>
               <Branch Name="13.2.1.1" Type="Product Version">
                  <FullProductName ProductID="P-2131V-13.2.1.1">Enterprise Manager for Peoplesoft Version 13.2.1.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Application Testing Suite" Type="Product Name">
               <Branch Name="10.1" Type="Product Version">
                  <FullProductName ProductID="P-4622V-10.1">Application Testing Suite Version 10.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager for Virtualization" Type="Product Name">
               <Branch Name="13.2.2" Type="Product Version">
                  <FullProductName ProductID="P-9586V-13.2.2">Enterprise Manager for Virtualization Version 13.2.2</FullProductName>
               </Branch>
               <Branch Name="13.2.3" Type="Product Version">
                  <FullProductName ProductID="P-9586V-13.2.3">Enterprise Manager for Virtualization Version 13.2.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager Ops Center" Type="Product Name">
               <Branch Name="12.2.2" Type="Product Version">
                  <FullProductName ProductID="P-9835V-12.2.2">Enterprise Manager Ops Center Version 12.2.2</FullProductName>
               </Branch>
               <Branch Name="12.3.3" Type="Product Version">
                  <FullProductName ProductID="P-9835V-12.3.3">Enterprise Manager Ops Center Version 12.3.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager for MySQL Database" Type="Product Name">
               <Branch Name="13.2.2.0.0 and prior" Type="Product Version">
                  <FullProductName ProductID="P-11166V-13.2.2.0.0 and prior">Enterprise Manager for MySQL Database Version 13.2.2.0.0 and prior</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Financial Services Applications" Type="Product Family">
            <Branch Name="Financial Services Revenue Management and Billing" Type="Product Name">
               <Branch Name="2.3.0.2.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.3.0.2.0">Financial Services Revenue Management and Billing Version 2.3.0.2.0</FullProductName>
               </Branch>
               <Branch Name="2.4.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.4.0.0.0">Financial Services Revenue Management and Billing Version 2.4.0.0.0</FullProductName>
               </Branch>
               <Branch Name="2.4.0.1.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.4.0.1.0">Financial Services Revenue Management and Billing Version 2.4.0.1.0</FullProductName>
               </Branch>
               <Branch Name="2.5.0.1.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.5.0.1.0">Financial Services Revenue Management and Billing Version 2.5.0.1.0</FullProductName>
               </Branch>
               <Branch Name="2.5.0.2.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.5.0.2.0">Financial Services Revenue Management and Billing Version 2.5.0.2.0</FullProductName>
               </Branch>
               <Branch Name="2.5.0.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.5.0.3.0">Financial Services Revenue Management and Billing Version 2.5.0.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Profitability Management" Type="Product Name">
               <Branch Name="6.1.1" Type="Product Version">
                  <FullProductName ProductID="P-5658V-6.1.1">Financial Services Profitability Management Version 6.1.1</FullProductName>
               </Branch>
               <Branch Name="8.0.x" Type="Product Version">
                  <FullProductName ProductID="P-5658V-8.0.x">Financial Services Profitability Management Version 8.0.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Funds Transfer Pricing" Type="Product Name">
               <Branch Name="6.1.1" Type="Product Version">
                  <FullProductName ProductID="P-5659V-6.1.1">Financial Services Funds Transfer Pricing Version 6.1.1</FullProductName>
               </Branch>
               <Branch Name="8.0.x" Type="Product Version">
                  <FullProductName ProductID="P-5659V-8.0.x">Financial Services Funds Transfer Pricing Version 8.0.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Analytical Applications Infrastructure" Type="Product Name">
               <Branch Name="7.3.3.x" Type="Product Version">
                  <FullProductName ProductID="P-5680V-7.3.3.x">Financial Services Analytical Applications Infrastructure Version 7.3.3.x</FullProductName>
               </Branch>
               <Branch Name="8.0.x" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.0.x">Financial Services Analytical Applications Infrastructure Version 8.0.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FLEXCUBE Universal Banking" Type="Product Name">
               <Branch Name="11.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-11.3.0">FLEXCUBE Universal Banking Version 11.3.0</FullProductName>
               </Branch>
               <Branch Name="11.4.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-11.4.0">FLEXCUBE Universal Banking Version 11.4.0</FullProductName>
               </Branch>
               <Branch Name="12.0.1" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.0.1">FLEXCUBE Universal Banking Version 12.0.1</FullProductName>
               </Branch>
               <Branch Name="12.0.2" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.0.2">FLEXCUBE Universal Banking Version 12.0.2</FullProductName>
               </Branch>
               <Branch Name="12.0.3" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.0.3">FLEXCUBE Universal Banking Version 12.0.3</FullProductName>
               </Branch>
               <Branch Name="12.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.1.0">FLEXCUBE Universal Banking Version 12.1.0</FullProductName>
               </Branch>
               <Branch Name="12.2.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.2.0">FLEXCUBE Universal Banking Version 12.2.0</FullProductName>
               </Branch>
               <Branch Name="12.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.3.0">FLEXCUBE Universal Banking Version 12.3.0</FullProductName>
               </Branch>
               <Branch Name="12.4.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.4.0">FLEXCUBE Universal Banking Version 12.4.0</FullProductName>
               </Branch>
               <Branch Name="14.0.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-14.0.0">FLEXCUBE Universal Banking Version 14.0.0</FullProductName>
               </Branch>
               <Branch Name="14.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-14.1.0">FLEXCUBE Universal Banking Version 14.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FLEXCUBE Investor Servicing" Type="Product Name">
               <Branch Name="12.0.4" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.0.4">FLEXCUBE Investor Servicing Version 12.0.4</FullProductName>
               </Branch>
               <Branch Name="12.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.1.0">FLEXCUBE Investor Servicing Version 12.1.0</FullProductName>
               </Branch>
               <Branch Name="12.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.3.0">FLEXCUBE Investor Servicing Version 12.3.0</FullProductName>
               </Branch>
               <Branch Name="12.4.0" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.4.0">FLEXCUBE Investor Servicing Version 12.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FLEXCUBE Enterprise Limits and Collateral Management" Type="Product Name">
               <Branch Name="12.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9100V-12.3.0">FLEXCUBE Enterprise Limits and Collateral Management Version 12.3.0</FullProductName>
               </Branch>
               <Branch Name="14.0.0" Type="Product Version">
                  <FullProductName ProductID="P-9100V-14.0.0">FLEXCUBE Enterprise Limits and Collateral Management Version 14.0.0</FullProductName>
               </Branch>
               <Branch Name="14.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9100V-14.1.0">FLEXCUBE Enterprise Limits and Collateral Management Version 14.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Banking Platform" Type="Product Name">
               <Branch Name="2.6.0" Type="Product Version">
                  <FullProductName ProductID="P-9178V-2.6.0">Banking Platform Version 2.6.0</FullProductName>
               </Branch>
               <Branch Name="2.6.1" Type="Product Version">
                  <FullProductName ProductID="P-9178V-2.6.1">Banking Platform Version 2.6.1</FullProductName>
               </Branch>
               <Branch Name="2.6.2" Type="Product Version">
                  <FullProductName ProductID="P-9178V-2.6.2">Banking Platform Version 2.6.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Behavior Detection Platform" Type="Product Name">
               <Branch Name="8.0.x" Type="Product Version">
                  <FullProductName ProductID="P-9190V-8.0.x">Financial Services Behavior Detection Platform Version 8.0.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Hedge Management and IFRS Valuations" Type="Product Name">
               <Branch Name="8.0.4" Type="Product Version">
                  <FullProductName ProductID="P-9332V-8.0.4">Financial Services Hedge Management and IFRS Valuations Version 8.0.4</FullProductName>
               </Branch>
               <Branch Name="8.0.5" Type="Product Version">
                  <FullProductName ProductID="P-9332V-8.0.5">Financial Services Hedge Management and IFRS Valuations Version 8.0.5</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Loan Loss Forecasting and Provisioning" Type="Product Name">
               <Branch Name="8.0.4" Type="Product Version">
                  <FullProductName ProductID="P-9474V-8.0.4">Financial Services Loan Loss Forecasting and Provisioning Version 8.0.4</FullProductName>
               </Branch>
               <Branch Name="8.0.5" Type="Product Version">
                  <FullProductName ProductID="P-9474V-8.0.5">Financial Services Loan Loss Forecasting and Provisioning Version 8.0.5</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Banking Corporate Lending" Type="Product Name">
               <Branch Name="12.3.0" Type="Product Version">
                  <FullProductName ProductID="P-12989V-12.3.0">Banking Corporate Lending Version 12.3.0</FullProductName>
               </Branch>
               <Branch Name="12.4.0" Type="Product Version">
                  <FullProductName ProductID="P-12989V-12.4.0">Banking Corporate Lending Version 12.4.0</FullProductName>
               </Branch>
               <Branch Name="12.5.0" Type="Product Version">
                  <FullProductName ProductID="P-12989V-12.5.0">Banking Corporate Lending Version 12.5.0</FullProductName>
               </Branch>
               <Branch Name="14.0.0" Type="Product Version">
                  <FullProductName ProductID="P-12989V-14.0.0">Banking Corporate Lending Version 14.0.0</FullProductName>
               </Branch>
               <Branch Name="14.1.0" Type="Product Version">
                  <FullProductName ProductID="P-12989V-14.1.0">Banking Corporate Lending Version 14.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Banking Payments" Type="Product Name">
               <Branch Name="12.2.0" Type="Product Version">
                  <FullProductName ProductID="P-13011V-12.2.0">Banking Payments Version 12.2.0</FullProductName>
               </Branch>
               <Branch Name="12.3.0" Type="Product Version">
                  <FullProductName ProductID="P-13011V-12.3.0">Banking Payments Version 12.3.0</FullProductName>
               </Branch>
               <Branch Name="12.4.0" Type="Product Version">
                  <FullProductName ProductID="P-13011V-12.4.0">Banking Payments Version 12.4.0</FullProductName>
               </Branch>
               <Branch Name="12.5.0" Type="Product Version">
                  <FullProductName ProductID="P-13011V-12.5.0">Banking Payments Version 12.5.0</FullProductName>
               </Branch>
               <Branch Name="14.1.0" Type="Product Version">
                  <FullProductName ProductID="P-13011V-14.1.0">Banking Payments Version 14.1.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Fusion Middleware" Type="Product Family">
            <Branch Name="Internet Directory" Type="Product Name">
               <Branch Name="11.1.1.9.0" Type="Product Version">
                  <FullProductName ProductID="P-355V-11.1.1.9.0">Internet Directory Version 11.1.1.9.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="JDeveloper" Type="Product Name">
               <Branch Name="12.1.3.0.0" Type="Product Version">
                  <FullProductName ProductID="P-807V-12.1.3.0.0">JDeveloper Version 12.1.3.0.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-807V-12.2.1.2.0">JDeveloper Version 12.2.1.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-807V-12.2.1.3.0">JDeveloper Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Fusion Middleware" Type="Product Name">
               <Branch Name="12.2.1.2" Type="Product Version">
                  <FullProductName ProductID="P-1032V-12.2.1.2">Fusion Middleware Version 12.2.1.2</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1032V-12.2.1.3">Fusion Middleware Version 12.2.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="SOA Suite" Type="Product Name">
               <Branch Name="11.1.1.7.0" Type="Product Version">
                  <FullProductName ProductID="P-1162V-11.1.1.7.0">SOA Suite Version 11.1.1.7.0</FullProductName>
               </Branch>
               <Branch Name="11.1.1.9.0" Type="Product Version">
                  <FullProductName ProductID="P-1162V-11.1.1.9.0">SOA Suite Version 11.1.1.9.0</FullProductName>
               </Branch>
               <Branch Name="12.1.3.0.0" Type="Product Version">
                  <FullProductName ProductID="P-1162V-12.1.3.0.0">SOA Suite Version 12.1.3.0.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-1162V-12.2.1.2.0">SOA Suite Version 12.2.1.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1162V-12.2.1.3.0">SOA Suite Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Fusion Middleware MapViewer" Type="Product Name">
               <Branch Name="12.2.1.2" Type="Product Version">
                  <FullProductName ProductID="P-1215V-12.2.1.2">Fusion Middleware MapViewer Version 12.2.1.2</FullProductName>
               </Branch>
               <Branch Name="12.2.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-1215V-12.2.1.2.0">Fusion Middleware MapViewer Version 12.2.1.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1215V-12.2.1.3">Fusion Middleware MapViewer Version 12.2.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1215V-12.2.1.3.0">Fusion Middleware MapViewer Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="BI Publisher (formerly XML Publisher)" Type="Product Name">
               <Branch Name="11.1.1.7.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-11.1.1.7.0">BI Publisher (formerly XML Publisher) Version 11.1.1.7.0</FullProductName>
               </Branch>
               <Branch Name="11.1.1.9.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-11.1.1.9.0">BI Publisher (formerly XML Publisher) Version 11.1.1.9.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-12.2.1.2.0">BI Publisher (formerly XML Publisher) Version 12.2.1.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-12.2.1.3.0">BI Publisher (formerly XML Publisher) Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="WebCenter Portal" Type="Product Name">
               <Branch Name="11.1.1.9.0" Type="Product Version">
                  <FullProductName ProductID="P-1696V-11.1.1.9.0">WebCenter Portal Version 11.1.1.9.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-1696V-12.2.1.2.0">WebCenter Portal Version 12.2.1.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1696V-12.2.1.3.0">WebCenter Portal Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Outside In Technology" Type="Product Name">
               <Branch Name="8.5.3" Type="Product Version">
                  <FullProductName ProductID="P-2276V-8.5.3">Outside In Technology Version 8.5.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="WebLogic Server" Type="Product Name">
               <Branch Name="10.3.6.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-10.3.6.0">WebLogic Server Version 10.3.6.0</FullProductName>
               </Branch>
               <Branch Name="12.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.1.3.0">WebLogic Server Version 12.1.3.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.2" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.2.1.2">WebLogic Server Version 12.2.1.2</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.2.1.3">WebLogic Server Version 12.2.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Business Process Management Suite" Type="Product Name">
               <Branch Name="11.1.1.7.0" Type="Product Version">
                  <FullProductName ProductID="P-5325V-11.1.1.7.0">Business Process Management Suite Version 11.1.1.7.0</FullProductName>
               </Branch>
               <Branch Name="11.1.1.9.0" Type="Product Version">
                  <FullProductName ProductID="P-5325V-11.1.1.9.0">Business Process Management Suite Version 11.1.1.9.0</FullProductName>
               </Branch>
               <Branch Name="12.1.3.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5325V-12.1.3.0.0">Business Process Management Suite Version 12.1.3.0.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-5325V-12.2.1.2.0">Business Process Management Suite Version 12.2.1.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5325V-12.2.1.3.0">Business Process Management Suite Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Repository" Type="Product Name">
               <Branch Name="11.1.1.7.0" Type="Product Version">
                  <FullProductName ProductID="P-5326V-11.1.1.7.0">Enterprise Repository Version 11.1.1.7.0</FullProductName>
               </Branch>
               <Branch Name="12.1.3.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5326V-12.1.3.0.0">Enterprise Repository Version 12.1.3.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Tuxedo" Type="Product Name">
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-5433V-12.1.1">Tuxedo Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-5433V-12.1.3">Tuxedo Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.2" Type="Product Version">
                  <FullProductName ProductID="P-5433V-12.2.2">Tuxedo Version 12.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="API Gateway" Type="Product Name">
               <Branch Name="11.1.2.4.0" Type="Product Version">
                  <FullProductName ProductID="P-9195V-11.1.2.4.0">API Gateway Version 11.1.2.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Data Quality" Type="Product Name">
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9464V-12.2.1.3.0">Enterprise Data Quality Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Endeca Information Discovery Studio" Type="Product Name">
               <Branch Name="3.1" Type="Product Version">
                  <FullProductName ProductID="P-9634V-3.1">Endeca Information Discovery Studio Version 3.1</FullProductName>
               </Branch>
               <Branch Name="3.2" Type="Product Version">
                  <FullProductName ProductID="P-9634V-3.2">Endeca Information Discovery Studio Version 3.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FMW Platform" Type="Product Name">
               <Branch Name="12.2.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-11190V-12.2.1.2.0">FMW Platform Version 12.2.1.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-11190V-12.2.1.3.0">FMW Platform Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Global Lifecycle Management" Type="Product Family">
            <Branch Name="Global Lifecycle Management OPatchAuto" Type="Product Name">
               <Branch Name="All" Type="Product Version">
                  <FullProductName ProductID="P-12752V-All">Global Lifecycle Management OPatchAuto Version All</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Hospitality Applications" Type="Product Family">
            <Branch Name="Hospitality OPERA 5 Property Services" Type="Product Name">
               <Branch Name="5.5.x" Type="Product Version">
                  <FullProductName ProductID="P-11580V-5.5.x">Hospitality OPERA 5 Property Services Version 5.5.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Hospitality Cruise Shipboard Property Management System" Type="Product Name">
               <Branch Name="8.x" Type="Product Version">
                  <FullProductName ProductID="P-11607V-8.x">Hospitality Cruise Shipboard Property Management System Version 8.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Hospitality Cruise Fleet Management" Type="Product Name">
               <Branch Name="9.x" Type="Product Version">
                  <FullProductName ProductID="P-11608V-9.x">Hospitality Cruise Fleet Management Version 9.x</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Hyperion" Type="Product Family">
            <Branch Name="Hyperion Data Relationship Management" Type="Product Name">
               <Branch Name="11.1.2.4.330" Type="Product Version">
                  <FullProductName ProductID="P-4375V-11.1.2.4.330">Hyperion Data Relationship Management Version 11.1.2.4.330</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Hyperion Financial Reporting" Type="Product Name">
               <Branch Name="11.1.2" Type="Product Version">
                  <FullProductName ProductID="P-8776V-11.1.2">Hyperion Financial Reporting Version 11.1.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Insurance Applications" Type="Product Family">
            <Branch Name="Insurance Policy Administration J2EE" Type="Product Name">
               <Branch Name="10.0" Type="Product Version">
                  <FullProductName ProductID="P-5279V-10.0">Insurance Policy Administration J2EE Version 10.0</FullProductName>
               </Branch>
               <Branch Name="10.1" Type="Product Version">
                  <FullProductName ProductID="P-5279V-10.1">Insurance Policy Administration J2EE Version 10.1</FullProductName>
               </Branch>
               <Branch Name="10.2" Type="Product Version">
                  <FullProductName ProductID="P-5279V-10.2">Insurance Policy Administration J2EE Version 10.2</FullProductName>
               </Branch>
               <Branch Name="11.0" Type="Product Version">
                  <FullProductName ProductID="P-5279V-11.0">Insurance Policy Administration J2EE Version 11.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle JD Edwards Products" Type="Product Family">
            <Branch Name="JD Edwards EnterpriseOne Tools" Type="Product Name">
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-4781V-9.2">JD Edwards EnterpriseOne Tools Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="JD Edwards World Security" Type="Product Name">
               <Branch Name="A9.3" Type="Product Version">
                  <FullProductName ProductID="P-4839V-A9.3">JD Edwards World Security Version A9.3</FullProductName>
               </Branch>
               <Branch Name="A9.3.1" Type="Product Version">
                  <FullProductName ProductID="P-4839V-A9.3.1">JD Edwards World Security Version A9.3.1</FullProductName>
               </Branch>
               <Branch Name="A9.4" Type="Product Version">
                  <FullProductName ProductID="P-4839V-A9.4">JD Edwards World Security Version A9.4</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Java SE" Type="Product Family">
            <Branch Name="Java" Type="Product Name">
               <Branch Name="10.0.1" Type="Product Version">
                  <FullProductName ProductID="P-856V-10.0.1">Java Version 10.0.1</FullProductName>
               </Branch>
               <Branch Name="10.0.1; Java SE Embedded: 8u171" Type="Product Version">
                  <FullProductName ProductID="P-856V-10.0.1; Java SE Embedded: 8u171">Java Version 10.0.1; Java SE Embedded: 8u171</FullProductName>
               </Branch>
               <Branch Name="10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18" Type="Product Version">
                  <FullProductName ProductID="P-856V-10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18">Java Version 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18</FullProductName>
               </Branch>
               <Branch Name="7u181" Type="Product Version">
                  <FullProductName ProductID="P-856V-7u181">Java Version 7u181</FullProductName>
               </Branch>
               <Branch Name="8u172" Type="Product Version">
                  <FullProductName ProductID="P-856V-8u172">Java Version 8u172</FullProductName>
               </Branch>
               <Branch Name="Java SE: 10.0.1" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE: 10.0.1">Java Version Java SE: 10.0.1</FullProductName>
               </Branch>
               <Branch Name="Java SE: 6u191" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE: 6u191">Java Version Java SE: 6u191</FullProductName>
               </Branch>
               <Branch Name="Java SE: 7u181" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE: 7u181">Java Version Java SE: 7u181</FullProductName>
               </Branch>
               <Branch Name="Java SE: 8u172" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE: 8u172">Java Version Java SE: 8u172</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle MySQL" Type="Product Family">
            <Branch Name="MySQL Workbench" Type="Product Name">
               <Branch Name="6.3.10 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-4627V-6.3.10 and earlier">MySQL Workbench Version 6.3.10 and earlier</FullProductName>
               </Branch>
               <Branch Name="8.0.11 and prior" Type="Product Version">
                  <FullProductName ProductID="P-4627V-8.0.11 and prior">MySQL Workbench Version 8.0.11 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Server" Type="Product Name">
               <Branch Name="5.5.60 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.5.60 and prior">MySQL Server Version 5.5.60 and prior</FullProductName>
               </Branch>
               <Branch Name="5.6.40 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.6.40 and prior">MySQL Server Version 5.6.40 and prior</FullProductName>
               </Branch>
               <Branch Name="5.7.22 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.7.22 and prior">MySQL Server Version 5.7.22 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.11 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-8.0.11 and prior">MySQL Server Version 8.0.11 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Enterprise Monitor" Type="Product Name">
               <Branch Name="3.4.7.4297 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8480V-3.4.7.4297 and prior">MySQL Enterprise Monitor Version 3.4.7.4297 and prior</FullProductName>
               </Branch>
               <Branch Name="4.0.4.5235 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8480V-4.0.4.5235 and prior">MySQL Enterprise Monitor Version 4.0.4.5235 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.0.8131 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8480V-8.0.0.8131 and prior">MySQL Enterprise Monitor Version 8.0.0.8131 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Connectors" Type="Product Name">
               <Branch Name="5.3.10 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8576V-5.3.10 and prior">MySQL Connectors Version 5.3.10 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.11 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8576V-8.0.11 and prior">MySQL Connectors Version 8.0.11 and prior</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle PeopleSoft Products" Type="Product Family">
            <Branch Name="PeopleSoft Enterprise HCM Candidate Gateway" Type="Product Name">
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-5043V-9.2">PeopleSoft Enterprise HCM Candidate Gateway Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise HCM Human Resources" Type="Product Name">
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-5071V-9.2">PeopleSoft Enterprise HCM Human Resources Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise PT PeopleTools" Type="Product Name">
               <Branch Name="8.55" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.55">PeopleSoft Enterprise PT PeopleTools Version 8.55</FullProductName>
               </Branch>
               <Branch Name="8.56" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.56">PeopleSoft Enterprise PT PeopleTools Version 8.56</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise CS Financial Aid" Type="Product Name">
               <Branch Name="9.0" Type="Product Version">
                  <FullProductName ProductID="P-5178V-9.0">PeopleSoft Enterprise CS Financial Aid Version 9.0</FullProductName>
               </Branch>
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-5178V-9.2">PeopleSoft Enterprise CS Financial Aid Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise FIN Install" Type="Product Name">
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-8925V-9.2">PeopleSoft Enterprise FIN Install Version 9.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Policy Automation" Type="Product Family">
            <Branch Name="Policy Automation" Type="Product Name">
               <Branch Name="10.4.7" Type="Product Version">
                  <FullProductName ProductID="P-5624V-10.4.7">Policy Automation Version 10.4.7</FullProductName>
               </Branch>
               <Branch Name="12.1.0" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.1.0">Policy Automation Version 12.1.0</FullProductName>
               </Branch>
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.1.1">Policy Automation Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.2.0" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.0">Policy Automation Version 12.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.1">Policy Automation Version 12.2.1</FullProductName>
               </Branch>
               <Branch Name="12.2.10" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.10">Policy Automation Version 12.2.10</FullProductName>
               </Branch>
               <Branch Name="12.2.2" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.2">Policy Automation Version 12.2.2</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.3">Policy Automation Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.4">Policy Automation Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.5">Policy Automation Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.6">Policy Automation Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.7">Policy Automation Version 12.2.7</FullProductName>
               </Branch>
               <Branch Name="12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.8">Policy Automation Version 12.2.8</FullProductName>
               </Branch>
               <Branch Name="12.2.9" Type="Product Version">
                  <FullProductName ProductID="P-5624V-12.2.9">Policy Automation Version 12.2.9</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Policy Automation for Mobile Devices" Type="Product Name">
               <Branch Name="10.4.7" Type="Product Version">
                  <FullProductName ProductID="P-5626V-10.4.7">Policy Automation for Mobile Devices Version 10.4.7</FullProductName>
               </Branch>
               <Branch Name="12.1.0" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.1.0">Policy Automation for Mobile Devices Version 12.1.0</FullProductName>
               </Branch>
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.1.1">Policy Automation for Mobile Devices Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.2.0" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.0">Policy Automation for Mobile Devices Version 12.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.1">Policy Automation for Mobile Devices Version 12.2.1</FullProductName>
               </Branch>
               <Branch Name="12.2.10" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.10">Policy Automation for Mobile Devices Version 12.2.10</FullProductName>
               </Branch>
               <Branch Name="12.2.2" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.2">Policy Automation for Mobile Devices Version 12.2.2</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.3">Policy Automation for Mobile Devices Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="12.2.4" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.4">Policy Automation for Mobile Devices Version 12.2.4</FullProductName>
               </Branch>
               <Branch Name="12.2.5" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.5">Policy Automation for Mobile Devices Version 12.2.5</FullProductName>
               </Branch>
               <Branch Name="12.2.6" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.6">Policy Automation for Mobile Devices Version 12.2.6</FullProductName>
               </Branch>
               <Branch Name="12.2.7" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.7">Policy Automation for Mobile Devices Version 12.2.7</FullProductName>
               </Branch>
               <Branch Name="12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.8">Policy Automation for Mobile Devices Version 12.2.8</FullProductName>
               </Branch>
               <Branch Name="12.2.9" Type="Product Version">
                  <FullProductName ProductID="P-5626V-12.2.9">Policy Automation for Mobile Devices Version 12.2.9</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Policy Automation Connector for Siebel" Type="Product Name">
               <Branch Name="10.4.6" Type="Product Version">
                  <FullProductName ProductID="P-5627V-10.4.6">Policy Automation Connector for Siebel Version 10.4.6</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Retail Applications" Type="Product Family">
            <Branch Name="Retail Integration Bus" Type="Product Name">
               <Branch Name="12.0.x" Type="Product Version">
                  <FullProductName ProductID="P-1807V-12.0.x">Retail Integration Bus Version 12.0.x</FullProductName>
               </Branch>
               <Branch Name="13.0.x" Type="Product Version">
                  <FullProductName ProductID="P-1807V-13.0.x">Retail Integration Bus Version 13.0.x</FullProductName>
               </Branch>
               <Branch Name="13.1.x" Type="Product Version">
                  <FullProductName ProductID="P-1807V-13.1.x">Retail Integration Bus Version 13.1.x</FullProductName>
               </Branch>
               <Branch Name="13.2.x" Type="Product Version">
                  <FullProductName ProductID="P-1807V-13.2.x">Retail Integration Bus Version 13.2.x</FullProductName>
               </Branch>
               <Branch Name="14.0.014.1.0" Type="Product Version">
                  <FullProductName ProductID="P-1807V-14.0.014.1.0">Retail Integration Bus Version 14.0.014.1.0</FullProductName>
               </Branch>
               <Branch Name="14.0.x" Type="Product Version">
                  <FullProductName ProductID="P-1807V-14.0.x">Retail Integration Bus Version 14.0.x</FullProductName>
               </Branch>
               <Branch Name="14.1.x" Type="Product Version">
                  <FullProductName ProductID="P-1807V-14.1.x">Retail Integration Bus Version 14.1.x</FullProductName>
               </Branch>
               <Branch Name="15.0" Type="Product Version">
                  <FullProductName ProductID="P-1807V-15.0">Retail Integration Bus Version 15.0</FullProductName>
               </Branch>
               <Branch Name="15.0.x" Type="Product Version">
                  <FullProductName ProductID="P-1807V-15.0.x">Retail Integration Bus Version 15.0.x</FullProductName>
               </Branch>
               <Branch Name="16.0" Type="Product Version">
                  <FullProductName ProductID="P-1807V-16.0">Retail Integration Bus Version 16.0</FullProductName>
               </Branch>
               <Branch Name="16.0.x" Type="Product Version">
                  <FullProductName ProductID="P-1807V-16.0.x">Retail Integration Bus Version 16.0.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Predictive Application Server" Type="Product Name">
               <Branch Name="15.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1823V-15.0.3">Retail Predictive Application Server Version 15.0.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Service Layer" Type="Product Name">
               <Branch Name="12.0.x" Type="Product Version">
                  <FullProductName ProductID="P-1836V-12.0.x">Retail Service Layer Version 12.0.x</FullProductName>
               </Branch>
               <Branch Name="13.0.x" Type="Product Version">
                  <FullProductName ProductID="P-1836V-13.0.x">Retail Service Layer Version 13.0.x</FullProductName>
               </Branch>
               <Branch Name="13.1.x" Type="Product Version">
                  <FullProductName ProductID="P-1836V-13.1.x">Retail Service Layer Version 13.1.x</FullProductName>
               </Branch>
               <Branch Name="13.2.x" Type="Product Version">
                  <FullProductName ProductID="P-1836V-13.2.x">Retail Service Layer Version 13.2.x</FullProductName>
               </Branch>
               <Branch Name="14.0.x" Type="Product Version">
                  <FullProductName ProductID="P-1836V-14.0.x">Retail Service Layer Version 14.0.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Back Office" Type="Product Name">
               <Branch Name="14.0" Type="Product Version">
                  <FullProductName ProductID="P-2013V-14.0">Retail Back Office Version 14.0</FullProductName>
               </Branch>
               <Branch Name="14.1" Type="Product Version">
                  <FullProductName ProductID="P-2013V-14.1">Retail Back Office Version 14.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Central Office" Type="Product Name">
               <Branch Name="14.0" Type="Product Version">
                  <FullProductName ProductID="P-2016V-14.0">Retail Central Office Version 14.0</FullProductName>
               </Branch>
               <Branch Name="14.1" Type="Product Version">
                  <FullProductName ProductID="P-2016V-14.1">Retail Central Office Version 14.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Point-of-Service" Type="Product Name">
               <Branch Name="14.0" Type="Product Version">
                  <FullProductName ProductID="P-2017V-14.0">Retail Point-of-Service Version 14.0</FullProductName>
               </Branch>
               <Branch Name="14.1" Type="Product Version">
                  <FullProductName ProductID="P-2017V-14.1">Retail Point-of-Service Version 14.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Returns Management" Type="Product Name">
               <Branch Name="14.0" Type="Product Version">
                  <FullProductName ProductID="P-2020V-14.0">Retail Returns Management Version 14.0</FullProductName>
               </Branch>
               <Branch Name="14.1" Type="Product Version">
                  <FullProductName ProductID="P-2020V-14.1">Retail Returns Management Version 14.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Clearance Optimization Engine" Type="Product Name">
               <Branch Name="14.0.5" Type="Product Version">
                  <FullProductName ProductID="P-5256V-14.0.5">Retail Clearance Optimization Engine Version 14.0.5</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Financial Integration" Type="Product Name">
               <Branch Name="13.2.x" Type="Product Version">
                  <FullProductName ProductID="P-10722V-13.2.x">Retail Financial Integration Version 13.2.x</FullProductName>
               </Branch>
               <Branch Name="14.0.x" Type="Product Version">
                  <FullProductName ProductID="P-10722V-14.0.x">Retail Financial Integration Version 14.0.x</FullProductName>
               </Branch>
               <Branch Name="14.1.x" Type="Product Version">
                  <FullProductName ProductID="P-10722V-14.1.x">Retail Financial Integration Version 14.1.x</FullProductName>
               </Branch>
               <Branch Name="15.0.x" Type="Product Version">
                  <FullProductName ProductID="P-10722V-15.0.x">Retail Financial Integration Version 15.0.x</FullProductName>
               </Branch>
               <Branch Name="16.0.x" Type="Product Version">
                  <FullProductName ProductID="P-10722V-16.0.x">Retail Financial Integration Version 16.0.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Service Backbone" Type="Product Name">
               <Branch Name="14.0.x" Type="Product Version">
                  <FullProductName ProductID="P-10867V-14.0.x">Retail Service Backbone Version 14.0.x</FullProductName>
               </Branch>
               <Branch Name="14.1.x" Type="Product Version">
                  <FullProductName ProductID="P-10867V-14.1.x">Retail Service Backbone Version 14.1.x</FullProductName>
               </Branch>
               <Branch Name="15.0.x" Type="Product Version">
                  <FullProductName ProductID="P-10867V-15.0.x">Retail Service Backbone Version 15.0.x</FullProductName>
               </Branch>
               <Branch Name="16.0.025" Type="Product Version">
                  <FullProductName ProductID="P-10867V-16.0.025">Retail Service Backbone Version 16.0.025</FullProductName>
               </Branch>
               <Branch Name="16.0.x" Type="Product Version">
                  <FullProductName ProductID="P-10867V-16.0.x">Retail Service Backbone Version 16.0.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Convenience and Fuel POS Software" Type="Product Name">
               <Branch Name="2.1.132" Type="Product Version">
                  <FullProductName ProductID="P-11515V-2.1.132">Retail Convenience and Fuel POS Software Version 2.1.132</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Order Broker Cloud Service" Type="Product Name">
               <Branch Name="15.0" Type="Product Version">
                  <FullProductName ProductID="P-11520V-15.0">Retail Order Broker Cloud Service Version 15.0</FullProductName>
               </Branch>
               <Branch Name="16.0" Type="Product Version">
                  <FullProductName ProductID="P-11520V-16.0">Retail Order Broker Cloud Service Version 16.0</FullProductName>
               </Branch>
               <Branch Name="5.2" Type="Product Version">
                  <FullProductName ProductID="P-11520V-5.2">Retail Order Broker Cloud Service Version 5.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MICROS XBR" Type="Product Name">
               <Branch Name="7.0.2" Type="Product Version">
                  <FullProductName ProductID="P-11564V-7.0.2">MICROS XBR Version 7.0.2</FullProductName>
               </Branch>
               <Branch Name="7.0.4" Type="Product Version">
                  <FullProductName ProductID="P-11564V-7.0.4">MICROS XBR Version 7.0.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MICROS Relate CRM Software" Type="Product Name">
               <Branch Name="10.8.x" Type="Product Version">
                  <FullProductName ProductID="P-11566V-10.8.x">MICROS Relate CRM Software Version 10.8.x</FullProductName>
               </Branch>
               <Branch Name="11.4.x" Type="Product Version">
                  <FullProductName ProductID="P-11566V-11.4.x">MICROS Relate CRM Software Version 11.4.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MICROS Retail-J" Type="Product Name">
               <Branch Name="10.2.x" Type="Product Version">
                  <FullProductName ProductID="P-11567V-10.2.x">MICROS Retail-J Version 10.2.x</FullProductName>
               </Branch>
               <Branch Name="11.0.x" Type="Product Version">
                  <FullProductName ProductID="P-11567V-11.0.x">MICROS Retail-J Version 11.0.x</FullProductName>
               </Branch>
               <Branch Name="12.0.x" Type="Product Version">
                  <FullProductName ProductID="P-11567V-12.0.x">MICROS Retail-J Version 12.0.x</FullProductName>
               </Branch>
               <Branch Name="12.1.1.x" Type="Product Version">
                  <FullProductName ProductID="P-11567V-12.1.1.x">MICROS Retail-J Version 12.1.1.x</FullProductName>
               </Branch>
               <Branch Name="12.1.2.x" Type="Product Version">
                  <FullProductName ProductID="P-11567V-12.1.2.x">MICROS Retail-J Version 12.1.2.x</FullProductName>
               </Branch>
               <Branch Name="12.1.x" Type="Product Version">
                  <FullProductName ProductID="P-11567V-12.1.x">MICROS Retail-J Version 12.1.x</FullProductName>
               </Branch>
               <Branch Name="13.1.x" Type="Product Version">
                  <FullProductName ProductID="P-11567V-13.1.x">MICROS Retail-J Version 13.1.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MICROS Lucas" Type="Product Name">
               <Branch Name="2.9.5.3" Type="Product Version">
                  <FullProductName ProductID="P-12633V-2.9.5.3">MICROS Lucas Version 2.9.5.3</FullProductName>
               </Branch>
               <Branch Name="2.9.5.4" Type="Product Version">
                  <FullProductName ProductID="P-12633V-2.9.5.4">MICROS Lucas Version 2.9.5.4</FullProductName>
               </Branch>
               <Branch Name="2.9.5.5" Type="Product Version">
                  <FullProductName ProductID="P-12633V-2.9.5.5">MICROS Lucas Version 2.9.5.5</FullProductName>
               </Branch>
               <Branch Name="2.9.5.6" Type="Product Version">
                  <FullProductName ProductID="P-12633V-2.9.5.6">MICROS Lucas Version 2.9.5.6</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Bulk Data Integration" Type="Product Name">
               <Branch Name="16.0" Type="Product Version">
                  <FullProductName ProductID="P-12968V-16.0">Retail Bulk Data Integration Version 16.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Customer Management and Segmentation Foundation" Type="Product Name">
               <Branch Name="16.x" Type="Product Version">
                  <FullProductName ProductID="P-13388V-16.x">Retail Customer Management and Segmentation Foundation Version 16.x</FullProductName>
               </Branch>
               <Branch Name="17.x" Type="Product Version">
                  <FullProductName ProductID="P-13388V-17.x">Retail Customer Management and Segmentation Foundation Version 17.x</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Siebel CRM" Type="Product Family">
            <Branch Name="Siebel UI Framework" Type="Product Name">
               <Branch Name="18.0" Type="Product Version">
                  <FullProductName ProductID="P-9011V-18.0">Siebel UI Framework Version 18.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Sun Systems Products Suite" Type="Product Family">
            <Branch Name="Solaris Cluster" Type="Product Name">
               <Branch Name="3.3" Type="Product Version">
                  <FullProductName ProductID="P-10005V-3.3">Solaris Cluster Version 3.3</FullProductName>
               </Branch>
               <Branch Name="4.3" Type="Product Version">
                  <FullProductName ProductID="P-10005V-4.3">Solaris Cluster Version 4.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Solaris Operating System" Type="Product Name">
               <Branch Name="10" Type="Product Version">
                  <FullProductName ProductID="P-10006V-10">Solaris Operating System Version 10</FullProductName>
               </Branch>
               <Branch Name="11.2" Type="Product Version">
                  <FullProductName ProductID="P-10006V-11.2">Solaris Operating System Version 11.2</FullProductName>
               </Branch>
               <Branch Name="11.3" Type="Product Version">
                  <FullProductName ProductID="P-10006V-11.3">Solaris Operating System Version 11.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="SuperCluster Specific Software" Type="Product Name">
               <Branch Name="Prior to 2.5.0" Type="Product Version">
                  <FullProductName ProductID="P-10011V-Prior to 2.5.0">SuperCluster Specific Software Version Prior to 2.5.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="SSM - (ssm_host_apps) HMP: Hardware Management Pack" Type="Product Name">
               <Branch Name="11.3" Type="Product Version">
                  <FullProductName ProductID="P-10016V-11.3">SSM - (ssm_host_apps) HMP: Hardware Management Pack Version 11.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Sun ZFS Storage Appliance Kit (AK) Software" Type="Product Name">
               <Branch Name="Prior to 8.7.18" Type="Product Version">
                  <FullProductName ProductID="P-10026V-Prior to 8.7.18">Sun ZFS Storage Appliance Kit (AK) Software Version Prior to 8.7.18</FullProductName>
               </Branch>
               <Branch Name="Prior to 8.7.19" Type="Product Version">
                  <FullProductName ProductID="P-10026V-Prior to 8.7.19">Sun ZFS Storage Appliance Kit (AK) Software Version Prior to 8.7.19</FullProductName>
               </Branch>
               <Branch Name="Prior to 8.7.20" Type="Product Version">
                  <FullProductName ProductID="P-10026V-Prior to 8.7.20">Sun ZFS Storage Appliance Kit (AK) Software Version Prior to 8.7.20</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Tape Library ACSLS" Type="Product Name">
               <Branch Name="Prior to ACSLS 8.4.0-3" Type="Product Version">
                  <FullProductName ProductID="P-10088V-Prior to ACSLS 8.4.0-3">Tape Library ACSLS Version Prior to ACSLS 8.4.0-3</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Supply Chain Products Suite" Type="Product Family">
            <Branch Name="Transportation Management" Type="Product Name">
               <Branch Name="6.2" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.2">Transportation Management Version 6.2</FullProductName>
               </Branch>
               <Branch Name="6.3.7" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.3.7">Transportation Management Version 6.3.7</FullProductName>
               </Branch>
               <Branch Name="6.4.1" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.4.1">Transportation Management Version 6.4.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Agile Engineering Data Management" Type="Product Name">
               <Branch Name="6.1.3" Type="Product Version">
                  <FullProductName ProductID="P-4436V-6.1.3">Agile Engineering Data Management Version 6.1.3</FullProductName>
               </Branch>
               <Branch Name="6.2.0" Type="Product Version">
                  <FullProductName ProductID="P-4436V-6.2.0">Agile Engineering Data Management Version 6.2.0</FullProductName>
               </Branch>
               <Branch Name="6.2.1" Type="Product Version">
                  <FullProductName ProductID="P-4436V-6.2.1">Agile Engineering Data Management Version 6.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Agile PLM MCAD Connector" Type="Product Name">
               <Branch Name="3.3" Type="Product Version">
                  <FullProductName ProductID="P-4440V-3.3">Agile PLM MCAD Connector Version 3.3</FullProductName>
               </Branch>
               <Branch Name="3.4" Type="Product Version">
                  <FullProductName ProductID="P-4440V-3.4">Agile PLM MCAD Connector Version 3.4</FullProductName>
               </Branch>
               <Branch Name="3.5" Type="Product Version">
                  <FullProductName ProductID="P-4440V-3.5">Agile PLM MCAD Connector Version 3.5</FullProductName>
               </Branch>
               <Branch Name="3.6" Type="Product Version">
                  <FullProductName ProductID="P-4440V-3.6">Agile PLM MCAD Connector Version 3.6</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Agile Product Lifecycle Management for Process" Type="Product Name">
               <Branch Name="6.2.0.0" Type="Product Version">
                  <FullProductName ProductID="P-4445V-6.2.0.0">Agile Product Lifecycle Management for Process Version 6.2.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="AutoVue VueLink Integration" Type="Product Name">
               <Branch Name="21.0.0" Type="Product Version">
                  <FullProductName ProductID="P-4454V-21.0.0">AutoVue VueLink Integration Version 21.0.0</FullProductName>
               </Branch>
               <Branch Name="21.0.1" Type="Product Version">
                  <FullProductName ProductID="P-4454V-21.0.1">AutoVue VueLink Integration Version 21.0.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Agile PLM Framework" Type="Product Name">
               <Branch Name="9.3.3" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.3">Agile PLM Framework Version 9.3.3</FullProductName>
               </Branch>
               <Branch Name="9.3.4" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.4">Agile PLM Framework Version 9.3.4</FullProductName>
               </Branch>
               <Branch Name="9.3.5" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.5">Agile PLM Framework Version 9.3.5</FullProductName>
               </Branch>
               <Branch Name="9.3.6" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.6">Agile PLM Framework Version 9.3.6</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Agile Recipe Management for Pharmaceuticals" Type="Product Name">
               <Branch Name="9.3.4" Type="Product Version">
                  <FullProductName ProductID="P-8780V-9.3.4">Agile Recipe Management for Pharmaceuticals Version 9.3.4</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Support Tools" Type="Product Family">
            <Branch Name="OSS Support Tools" Type="Product Name">
               <Branch Name="Prior to 18.3" Type="Product Version">
                  <FullProductName ProductID="P-1330V-Prior to 18.3">OSS Support Tools Version Prior to 18.3</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Utilities Applications" Type="Product Family">
            <Branch Name="Utilities Network Management System" Type="Product Name">
               <Branch Name="1.12.x" Type="Product Version">
                  <FullProductName ProductID="P-2241V-1.12.x">Utilities Network Management System Version 1.12.x</FullProductName>
               </Branch>
               <Branch Name="2.3.x" Type="Product Version">
                  <FullProductName ProductID="P-2241V-2.3.x">Utilities Network Management System Version 2.3.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Utilities Work and Asset Management" Type="Product Name">
               <Branch Name="1.9.1.2.12" Type="Product Version">
                  <FullProductName ProductID="P-2244V-1.9.1.2.12">Utilities Work and Asset Management Version 1.9.1.2.12</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Utilities Framework" Type="Product Name">
               <Branch Name="4.3.x" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.3.x">Utilities Framework Version 4.3.x</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Virtualization" Type="Product Family">
            <Branch Name="VM VirtualBox" Type="Product Name">
               <Branch Name="Prior to 5.2.16" Type="Product Version">
                  <FullProductName ProductID="P-8370V-Prior to 5.2.16">VM VirtualBox Version Prior to 5.2.16</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Secure Global Desktop" Type="Product Name">
               <Branch Name="5.3" Type="Product Version">
                  <FullProductName ProductID="P-8539V-5.3">Secure Global Desktop Version 5.3</FullProductName>
               </Branch>
               <Branch Name="5.4" Type="Product Version">
                  <FullProductName ProductID="P-8539V-5.4">Secure Global Desktop Version 5.4</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle iLearning" Type="Product Family">
            <Branch Name="iLearning" Type="Product Name">
               <Branch Name="6.2" Type="Product Version">
                  <FullProductName ProductID="P-902V-6.2">iLearning Version 6.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
      </Branch>
   </ProductTree>
   <Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2011-4461</Title>
      <Notes>
         <Note Audience="All" Ordinal="1" Title="Details" Type="Details">Vulnerability in the Oracle Endeca Information Discovery Studio component of Oracle Fusion Middleware (subcomponent: Studio (Jetty)).  Supported versions that are affected are 3.1 and  3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Endeca Information Discovery Studio.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Endeca Information Discovery Studio. CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2011-4461</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9634V-3.1</ProductID>
            <ProductID>P-9634V-3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9634V-3.1</ProductID>
            <ProductID>P-9634V-3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-3577</Title>
      <Notes>
         <Note Audience="All" Ordinal="2" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing component of Oracle Financial Services Applications (subcomponent: External Message (HTTP Client)).  Supported versions that are affected are 2.3.0.2.0, 
2.4.0.0.0, 
2.4.0.1.0, 
2.5.0.1.0, 
2.5.0.2.0 and 
2.5.0.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Revenue Management and Billing accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-3577</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.3.0.2.0</ProductID>
            <ProductID>P-5322V-2.4.0.0.0</ProductID>
            <ProductID>P-5322V-2.4.0.1.0</ProductID>
            <ProductID>P-5322V-2.5.0.1.0</ProductID>
            <ProductID>P-5322V-2.5.0.2.0</ProductID>
            <ProductID>P-5322V-2.5.0.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5322V-2.3.0.2.0</ProductID>
            <ProductID>P-5322V-2.4.0.0.0</ProductID>
            <ProductID>P-5322V-2.4.0.1.0</ProductID>
            <ProductID>P-5322V-2.5.0.1.0</ProductID>
            <ProductID>P-5322V-2.5.0.2.0</ProductID>
            <ProductID>P-5322V-2.5.0.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-0204</Title>
      <Notes>
         <Note Audience="All" Ordinal="3" Title="Details" Type="Details">Vulnerability in the Oracle Internet Directory component of Oracle Fusion Middleware (subcomponent: SSL/TLS).   The supported version that is affected is 11.1.1.9.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Internet Directory.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Internet Directory accessible data.  Note: Please refer to MOS document (&lt;a href="https://support.oracle.com/rs?type=doc&amp;id=2420947.1"&gt;Doc ID 2420947.1)&lt;/a&gt; for instructions on how to address this issue. CVSS 3.0 Base Score 5.9 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-0204</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-355V-11.1.1.9.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-355V-11.1.1.9.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-5600</Title>
      <Notes>
         <Note Audience="All" Ordinal="4" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management component of Oracle Communications Applications (subcomponent: Security (OpenSSH)).   The supported version that is affected is 12.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via SSH to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Policy Management accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-5600</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10900V-12.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-7501</Title>
      <Notes>
         <Note Audience="All" Ordinal="5" Title="Details" Type="Details">Vulnerability in the Tape Library ACSLS component of Oracle Sun Systems Products Suite (subcomponent: Software (Apache Commons Collections)).  Supported versions that are affected are Prior to ACSLS 8.4.0-3. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Tape Library ACSLS.  Successful attacks of this vulnerability can result in takeover of Tape Library ACSLS. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-7501</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10088V-Prior to ACSLS 8.4.0-3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10088V-Prior to ACSLS 8.4.0-3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-7940</Title>
      <Notes>
         <Note Audience="All" Ordinal="6" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management component of Oracle Communications Applications (subcomponent: CMP (Bouncy Castle)).   The supported version that is affected is 12.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications Policy Management accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-7940</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10900V-12.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-7940</Title>
      <Notes>
         <Note Audience="All" Ordinal="7" Title="Details" Type="Details">Vulnerability in the Oracle JDeveloper component of Oracle Fusion Middleware (subcomponent: None (Bouncy Castle Java package)).  Supported versions that are affected are 12.1.3.0.0, 12.2.1.2.0 and  12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle JDeveloper accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-7940</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-807V-12.1.3.0.0</ProductID>
            <ProductID>P-807V-12.2.1.2.0</ProductID>
            <ProductID>P-807V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-807V-12.1.3.0.0</ProductID>
            <ProductID>P-807V-12.2.1.2.0</ProductID>
            <ProductID>P-807V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-7940</Title>
      <Notes>
         <Note Audience="All" Ordinal="8" Title="Details" Type="Details">Vulnerability in the Oracle Retail Convenience and Fuel POS Software component of Oracle Retail Applications (subcomponent: OPT Server (Bouncy Castle Java Library)).   The supported version that is affected is 2.1.132. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Convenience and Fuel POS Software.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Convenience and Fuel POS Software accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-7940</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11515V-2.1.132</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11515V-2.1.132</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-0714</Title>
      <Notes>
         <Note Audience="All" Ordinal="9" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management component of Oracle Communications Applications (subcomponent: Security (Apache Tomcat)).   The supported version that is affected is 12.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Policy Management. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-0714</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10900V-12.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1181</Title>
      <Notes>
         <Note Audience="All" Ordinal="10" Title="Details" Type="Details">Vulnerability in the Agile Recipe Management for Pharmaceuticals component of Oracle Supply Chain Products Suite (subcomponent: UI Components-Framework (Apache Struts 1)).   The supported version that is affected is 9.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Agile Recipe Management for Pharmaceuticals.  Successful attacks of this vulnerability can result in takeover of Agile Recipe Management for Pharmaceuticals. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1181</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8780V-9.3.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8780V-9.3.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1181</Title>
      <Notes>
         <Note Audience="All" Ordinal="11" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for Fusion Middleware component of Oracle Enterprise Manager Products Suite (subcomponent: FMW Plugin for CC (Apache Struts 1)).   The supported version that is affected is 12.1.0.5. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager for Fusion Middleware. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1181</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1369V-12.1.0.5</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1369V-12.1.0.5</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1181</Title>
      <Notes>
         <Note Audience="All" Ordinal="12" Title="Details" Type="Details">Vulnerability in the MICROS XBR component of Oracle Retail Applications (subcomponent: Retail (Apache Struts 1)).  Supported versions that are affected are 7.0.2 and  7.0.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise MICROS XBR.  Successful attacks of this vulnerability can result in takeover of MICROS XBR. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1181</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11564V-7.0.2</ProductID>
            <ProductID>P-11564V-7.0.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11564V-7.0.2</ProductID>
            <ProductID>P-11564V-7.0.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1181</Title>
      <Notes>
         <Note Audience="All" Ordinal="13" Title="Details" Type="Details">Vulnerability in the Oracle Transportation Management component of Oracle Supply Chain Products Suite (subcomponent: Install (Apache Struts 1)).  Supported versions that are affected are 6.2, 6.3.7 and  6.4.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Transportation Management.  Successful attacks of this vulnerability can result in takeover of Oracle Transportation Management. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1181</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3.7</ProductID>
            <ProductID>P-1991V-6.4.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3.7</ProductID>
            <ProductID>P-1991V-6.4.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="14" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-2099</Title>
      <Notes>
         <Note Audience="All" Ordinal="14" Title="Details" Type="Details">Vulnerability in the Oracle Communications User Data Repository component of Oracle Communications Applications (subcomponent: Security (Apache Xerces)).  Supported versions that are affected are 10.x and  12.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications User Data Repository.  Successful attacks of this vulnerability can result in takeover of Oracle Communications User Data Repository. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-2099</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11108V-10.x</ProductID>
            <ProductID>P-11108V-12.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11108V-10.x</ProductID>
            <ProductID>P-11108V-12.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="15" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-2176</Title>
      <Notes>
         <Note Audience="All" Ordinal="15" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management component of Oracle Communications Applications (subcomponent: Security (OpenSSL)).   The supported version that is affected is 12.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Policy Management and  unauthorized read access to a subset of Oracle Communications Policy Management accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-2176</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10900V-12.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="16" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-3506</Title>
      <Notes>
         <Note Audience="All" Ordinal="16" Title="Details" Type="Details">Vulnerability in the Oracle Retail Convenience and Fuel POS Software component of Oracle Retail Applications (subcomponent: Point of Sale).   The supported version that is affected is 2.1.132. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Convenience and Fuel POS Software.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Convenience and Fuel POS Software. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-3506</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11515V-2.1.132</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11515V-2.1.132</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="17" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-4055</Title>
      <Notes>
         <Note Audience="All" Ordinal="17" Title="Details" Type="Details">Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Core (Moment)).  Supported versions that are affected are 16.x, 17.x and  18.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Primavera Unifier. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-4055</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="18" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-5019</Title>
      <Notes>
         <Note Audience="All" Ordinal="18" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Framework component of Oracle Utilities Applications (subcomponent: Help (Apache Trinidad)).   The supported version that is affected is 4.3.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Framework.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Utilities Framework. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-5019</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2245V-4.3.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2245V-4.3.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="19" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-5195</Title>
      <Notes>
         <Note Audience="All" Ordinal="19" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management component of Oracle Communications Applications (subcomponent: Platform (Kernel)).   The supported version that is affected is 12.x. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Policy Management executes to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Policy Management. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-5195</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10900V-12.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="20" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-6814</Title>
      <Notes>
         <Note Audience="All" Ordinal="20" Title="Details" Type="Details">Vulnerability in the Oracle Agile PLM component of Oracle Supply Chain Products Suite (subcomponent: Event Java PX (Apache Groovy)).  Supported versions that are affected are 9.3.3, 9.3.4, 9.3.5 and  9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Agile PLM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM. CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-6814</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4461V-9.3.3</ProductID>
            <ProductID>P-4461V-9.3.4</ProductID>
            <ProductID>P-4461V-9.3.5</ProductID>
            <ProductID>P-4461V-9.3.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4461V-9.3.3</ProductID>
            <ProductID>P-4461V-9.3.4</ProductID>
            <ProductID>P-4461V-9.3.5</ProductID>
            <ProductID>P-4461V-9.3.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="21" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-6814</Title>
      <Notes>
         <Note Audience="All" Ordinal="21" Title="Details" Type="Details">Vulnerability in the Oracle Retail Integration Bus component of Oracle Retail Applications (subcomponent: RIB Kernal (Apache Groovy)).  Supported versions that are affected are 12.0.x, 
13.0.x, 
13.1.x, 
13.2.x, 
14.0.x, 
14.1.x, 
15.0.x and  
16.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Integration Bus.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Retail Integration Bus, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Retail Integration Bus. CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-6814</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1807V-12.0.x</ProductID>
            <ProductID>P-1807V-13.0.x</ProductID>
            <ProductID>P-1807V-13.1.x</ProductID>
            <ProductID>P-1807V-13.2.x</ProductID>
            <ProductID>P-1807V-14.0.x</ProductID>
            <ProductID>P-1807V-14.1.x</ProductID>
            <ProductID>P-1807V-15.0.x</ProductID>
            <ProductID>P-1807V-16.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1807V-12.0.x</ProductID>
            <ProductID>P-1807V-13.0.x</ProductID>
            <ProductID>P-1807V-13.1.x</ProductID>
            <ProductID>P-1807V-13.2.x</ProductID>
            <ProductID>P-1807V-14.0.x</ProductID>
            <ProductID>P-1807V-14.1.x</ProductID>
            <ProductID>P-1807V-15.0.x</ProductID>
            <ProductID>P-1807V-16.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="22" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-6814</Title>
      <Notes>
         <Note Audience="All" Ordinal="22" Title="Details" Type="Details">Vulnerability in the Oracle Retail Service Backbone component of Oracle Retail Applications (subcomponent: Install (Apache Groovy)).   The supported version that is affected is 16.0.025. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Service Backbone.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Retail Service Backbone, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Retail Service Backbone. CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-6814</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10867V-16.0.025</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10867V-16.0.025</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="23" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-7103</Title>
      <Notes>
         <Note Audience="All" Ordinal="23" Title="Details" Type="Details">Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Core (jQueryUI)).  Supported versions that are affected are 16.x, 17.x and  18.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Unifier, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Primavera Unifier accessible data as well as  unauthorized read access to a subset of Primavera Unifier accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-7103</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="24" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-9843</Title>
      <Notes>
         <Note Audience="All" Ordinal="24" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Search Export SDK (zlib)).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-9843</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="25" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-9878</Title>
      <Notes>
         <Note Audience="All" Ordinal="25" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center component of Oracle Enterprise Manager Products Suite (subcomponent: Framework (Spring Framework)).  Supported versions that are affected are 12.2.2 and  12.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Enterprise Manager Ops Center accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-9878</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.2.2</ProductID>
            <ProductID>P-9835V-12.3.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9835V-12.2.2</ProductID>
            <ProductID>P-9835V-12.3.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="26" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-9878</Title>
      <Notes>
         <Note Audience="All" Ordinal="26" Title="Details" Type="Details">Vulnerability in the Oracle Retail Back Office component of Oracle Retail Applications (subcomponent: Security  (Spring Framework)).  Supported versions that are affected are 14.0 and  14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Back Office.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Back Office accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-9878</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2013V-14.0</ProductID>
            <ProductID>P-2013V-14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2013V-14.0</ProductID>
            <ProductID>P-2013V-14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="27" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-9878</Title>
      <Notes>
         <Note Audience="All" Ordinal="27" Title="Details" Type="Details">Vulnerability in the Oracle Retail Central Office component of Oracle Retail Applications (subcomponent: Security).  Supported versions that are affected are 14.0 and  14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Central Office.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Central Office accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-9878</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2016V-14.0</ProductID>
            <ProductID>P-2016V-14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2016V-14.0</ProductID>
            <ProductID>P-2016V-14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="28" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-9878</Title>
      <Notes>
         <Note Audience="All" Ordinal="28" Title="Details" Type="Details">Vulnerability in the Oracle Retail Integration Bus component of Oracle Retail Applications (subcomponent: Install (Spring Framework)).  Supported versions that are affected are 14.0.x, 14.1.x, 15.0.x and 16.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Integration Bus.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Integration Bus accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-9878</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1807V-14.0.x</ProductID>
            <ProductID>P-1807V-14.1.x</ProductID>
            <ProductID>P-1807V-15.0.x</ProductID>
            <ProductID>P-1807V-16.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1807V-14.0.x</ProductID>
            <ProductID>P-1807V-14.1.x</ProductID>
            <ProductID>P-1807V-15.0.x</ProductID>
            <ProductID>P-1807V-16.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="29" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-9878</Title>
      <Notes>
         <Note Audience="All" Ordinal="29" Title="Details" Type="Details">Vulnerability in the Oracle Retail Point-of-Sale component of Oracle Retail Applications (subcomponent: Transaction (Spring Framework)).  Supported versions that are affected are 14.0 and  14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Point-of-Sale.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Point-of-Sale accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-9878</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2017V-14.0</ProductID>
            <ProductID>P-2017V-14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2017V-14.0</ProductID>
            <ProductID>P-2017V-14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="30" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-9878</Title>
      <Notes>
         <Note Audience="All" Ordinal="30" Title="Details" Type="Details">Vulnerability in the Oracle Retail Returns Management component of Oracle Retail Applications (subcomponent: Security (Spring Framework)).  Supported versions that are affected are 14.0 and  14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Returns Management.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Returns Management accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-9878</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2020V-14.0</ProductID>
            <ProductID>P-2020V-14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2020V-14.0</ProductID>
            <ProductID>P-2020V-14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="31" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-0379</Title>
      <Notes>
         <Note Audience="All" Ordinal="31" Title="Details" Type="Details">Vulnerability in the Oracle Communications Interactive Session Recorder component of Oracle Communications Applications (subcomponent: Security (libgcrypt)).  Supported versions that are affected are 5.x and  6.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Interactive Session Recorder.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications Interactive Session Recorder accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-0379</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10765V-5.x</ProductID>
            <ProductID>P-10765V-6.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10765V-5.x</ProductID>
            <ProductID>P-10765V-6.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="32" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-0379</Title>
      <Notes>
         <Note Audience="All" Ordinal="32" Title="Details" Type="Details">Vulnerability in the MySQL Workbench component of Oracle MySQL (subcomponent: Workbench: Security: Encryption  (libgcrypt)).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Workbench.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all MySQL Workbench accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-0379</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4627V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4627V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="33" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-12617</Title>
      <Notes>
         <Note Audience="All" Ordinal="33" Title="Details" Type="Details">Vulnerability in the FMW Platform component of Oracle Fusion Middleware (subcomponent: Common Components (Apache Tomcat)).  Supported versions that are affected are 12.2.1.2.0 and  12.2.1.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise FMW Platform.  Successful attacks of this vulnerability can result in takeover of FMW Platform. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-12617</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11190V-12.2.1.2.0</ProductID>
            <ProductID>P-11190V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11190V-12.2.1.2.0</ProductID>
            <ProductID>P-11190V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="34" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-12617</Title>
      <Notes>
         <Note Audience="All" Ordinal="34" Title="Details" Type="Details">Vulnerability in the Oracle Retail Convenience and Fuel POS Software component of Oracle Retail Applications (subcomponent: OPT Server (Apache Tomcat)).   The supported version that is affected is 2.1.132. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Convenience and Fuel POS Software.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Convenience and Fuel POS Software. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-12617</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11515V-2.1.132</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11515V-2.1.132</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="35" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-15095</Title>
      <Notes>
         <Note Audience="All" Ordinal="35" Title="Details" Type="Details">Vulnerability in the Oracle Spatial (jackson-databind) component of Oracle Database Server.  Supported versions that are affected are 12.2.0.1 and 18.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Spatial (jackson-databind).  Successful attacks of this vulnerability can result in takeover of Oracle Spatial (jackson-databind). CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-15095</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-619V-12.2.0.1</ProductID>
            <ProductID>P-619V-18.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-619V-12.2.0.1</ProductID>
            <ProductID>P-619V-18.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="36" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-3633</Title>
      <Notes>
         <Note Audience="All" Ordinal="36" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management component of Oracle Communications Applications (subcomponent: Security (MySQL)).   The supported version that is affected is 12.x. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Policy Management as well as  unauthorized update, insert or delete access to some of Oracle Communications Policy Management accessible data. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-3633</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10900V-12.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="37" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-3736</Title>
      <Notes>
         <Note Audience="All" Ordinal="37" Title="Details" Type="Details">Vulnerability in the JD Edwards World Security component of Oracle JD Edwards Products (subcomponent: GUI / World Vision (OpenSSL)).  Supported versions that are affected are A9.3, A9.3.1 and  A9.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards World Security.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards World Security accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-3736</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4839V-A9.3</ProductID>
            <ProductID>P-4839V-A9.3.1</ProductID>
            <ProductID>P-4839V-A9.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4839V-A9.3</ProductID>
            <ProductID>P-4839V-A9.3.1</ProductID>
            <ProductID>P-4839V-A9.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="38" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5533</Title>
      <Notes>
         <Note Audience="All" Ordinal="38" Title="Details" Type="Details">Vulnerability in the MICROS Lucas component of Oracle Retail Applications (subcomponent: Security (JasperReports)).  Supported versions that are affected are 2.9.5.3, 2.9.5.4,2.9.5.5 and  2.9.5.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise MICROS Lucas.  Successful attacks of this vulnerability can result in takeover of MICROS Lucas. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5533</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12633V-2.9.5.3</ProductID>
            <ProductID>P-12633V-2.9.5.4</ProductID>
            <ProductID>P-12633V-2.9.5.5</ProductID>
            <ProductID>P-12633V-2.9.5.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12633V-2.9.5.3</ProductID>
            <ProductID>P-12633V-2.9.5.4</ProductID>
            <ProductID>P-12633V-2.9.5.5</ProductID>
            <ProductID>P-12633V-2.9.5.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="39" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5533</Title>
      <Notes>
         <Note Audience="All" Ordinal="39" Title="Details" Type="Details">Vulnerability in the MICROS Relate CRM Software component of Oracle Retail Applications (subcomponent: Internal Operations (JasperReports)).  Supported versions that are affected are 10.8.x and  11.4.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise MICROS Relate CRM Software.  Successful attacks of this vulnerability can result in takeover of MICROS Relate CRM Software. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5533</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11566V-10.8.x</ProductID>
            <ProductID>P-11566V-11.4.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11566V-10.8.x</ProductID>
            <ProductID>P-11566V-11.4.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="40" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5533</Title>
      <Notes>
         <Note Audience="All" Ordinal="40" Title="Details" Type="Details">Vulnerability in the Oracle Retail Order Broker component of Oracle Retail Applications (subcomponent: Order Broker Foundation (JasperReports)).  Supported versions that are affected are 5.2, 15.0 and  16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Order Broker.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Order Broker. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5533</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11520V-5.2</ProductID>
            <ProductID>P-11520V-15.0</ProductID>
            <ProductID>P-11520V-16.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11520V-5.2</ProductID>
            <ProductID>P-11520V-15.0</ProductID>
            <ProductID>P-11520V-16.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="41" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="41" Title="Details" Type="Details">Vulnerability in the Oracle AutoVue VueLink Integration component of Oracle Supply Chain Products Suite (subcomponent: Installation Issues (Apache Log4j)).  Supported versions that are affected are 21.0.0 and  21.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle AutoVue VueLink Integration.  Successful attacks of this vulnerability can result in takeover of Oracle AutoVue VueLink Integration. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4454V-21.0.0</ProductID>
            <ProductID>P-4454V-21.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4454V-21.0.0</ProductID>
            <ProductID>P-4454V-21.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="42" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="42" Title="Details" Type="Details">Vulnerability in the Oracle Banking Platform component of Oracle Financial Services Applications (subcomponent: Collections (Apache Log4j)).  Supported versions that are affected are 2.6.0, 2.6.1 and  2.6.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Platform.  Successful attacks of this vulnerability can result in takeover of Oracle Banking Platform. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9178V-2.6.0</ProductID>
            <ProductID>P-9178V-2.6.1</ProductID>
            <ProductID>P-9178V-2.6.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9178V-2.6.0</ProductID>
            <ProductID>P-9178V-2.6.1</ProductID>
            <ProductID>P-9178V-2.6.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="43" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="43" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Data Quality component of Oracle Fusion Middleware (subcomponent: General (Apache Log4j)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Data Quality.  Successful attacks of this vulnerability can result in takeover of Oracle Enterprise Data Quality. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9464V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9464V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="44" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="44" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Products Suite (subcomponent: Installer (Apache Log4j)).  Supported versions that are affected are 12.1.0.5 and  13.2.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Base Platform.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager Base Platform. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-12.1.0.5</ProductID>
            <ProductID>P-1370V-13.2.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1370V-12.1.0.5</ProductID>
            <ProductID>P-1370V-13.2.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="45" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="45" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Products Suite (subcomponent: Security Framework (Apache Log4j)).  Supported versions that are affected are 12.1.0.5 and  13.2.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Base Platform.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager Base Platform. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-12.1.0.5</ProductID>
            <ProductID>P-1370V-13.2.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1370V-12.1.0.5</ProductID>
            <ProductID>P-1370V-13.2.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="46" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="46" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for Fusion Middleware component of Oracle Enterprise Manager Products Suite (subcomponent: Application Replay (Apache Log4j)).  Supported versions that are affected are 12.1.0.5 and  13.2.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager for Fusion Middleware. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1369V-12.1.0.5</ProductID>
            <ProductID>P-1369V-13.2.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1369V-12.1.0.5</ProductID>
            <ProductID>P-1369V-13.2.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="47" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="47" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for Fusion Middleware component of Oracle Enterprise Manager Products Suite (subcomponent: FMW Plugin for CC (Apache Log4j)).  Supported versions that are affected are 12.1.0.5 and  13.2.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager for Fusion Middleware. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1369V-12.1.0.5</ProductID>
            <ProductID>P-1369V-13.2.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1369V-12.1.0.5</ProductID>
            <ProductID>P-1369V-13.2.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="48" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="48" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for MySQL Database component of Oracle Enterprise Manager Products Suite (subcomponent: EM Plugin: General (Apache Log4j)).  Supported versions that are affected are 13.2.2.0.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via Log4j to compromise Enterprise Manager for MySQL Database.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager for MySQL Database. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11166V-13.2.2.0.0 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11166V-13.2.2.0.0 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="49" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="49" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for Oracle Database component of Oracle Enterprise Manager Products Suite (subcomponent: Provisioning (Apache Log4j)).  Supported versions that are affected are 12.1.0.8 and  13.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Oracle Database.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager for Oracle Database. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1366V-12.1.0.8</ProductID>
            <ProductID>P-1366V-13.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1366V-12.1.0.8</ProductID>
            <ProductID>P-1366V-13.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="50" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="50" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for Peoplesoft component of Oracle Enterprise Manager Products Suite (subcomponent: PSEM Plugin (Apache Log4j)).  Supported versions that are affected are 13.1.1.1 and  13.2.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Peoplesoft.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager for Peoplesoft. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2131V-13.1.1.1</ProductID>
            <ProductID>P-2131V-13.2.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2131V-13.1.1.1</ProductID>
            <ProductID>P-2131V-13.2.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="51" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="51" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure component of Oracle Financial Services Applications (subcomponent: Infrastructure (Apache Log4j)).  Supported versions that are affected are 7.3.3.x and  8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Analytical Applications Infrastructure.  Note: Please refer MOS document (&lt;a href="https://support.oracle.com/rs?type=doc&amp;id=2380553.1"&gt;Doc ID 2380553.1)&lt;/a&gt; for applicability across other Oracle Financial Services products. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-7.3.3.x</ProductID>
            <ProductID>P-5680V-8.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5680V-7.3.3.x</ProductID>
            <ProductID>P-5680V-8.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="52" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="52" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Behavior Detection Platform component of Oracle Financial Services Applications (subcomponent: Ingestion (Apache Log4j)).   The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Behavior Detection Platform.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Behavior Detection Platform. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9190V-8.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9190V-8.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="53" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="53" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Funds Transfer Pricing component of Oracle Financial Services Applications (subcomponent: Logging (Apache Log4j)).  Supported versions that are affected are 6.1.1 and  8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Funds Transfer Pricing.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Funds Transfer Pricing. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5659V-6.1.1</ProductID>
            <ProductID>P-5659V-8.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5659V-6.1.1</ProductID>
            <ProductID>P-5659V-8.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="54" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="54" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Hedge Management and IFRS Valuations component of Oracle Financial Services Applications (subcomponent: Logging (Apache Log4j)).  Supported versions that are affected are 8.0.4 and  8.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Hedge Management and IFRS Valuations.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Hedge Management and IFRS Valuations. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9332V-8.0.4</ProductID>
            <ProductID>P-9332V-8.0.5</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9332V-8.0.4</ProductID>
            <ProductID>P-9332V-8.0.5</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="55" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="55" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Loan Loss Forecasting and Provisioning component of Oracle Financial Services Applications (subcomponent: Logging (Apache Log4j)).  Supported versions that are affected are 8.0.4 and  8.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Loan Loss Forecasting and Provisioning.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Loan Loss Forecasting and Provisioning. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9474V-8.0.4</ProductID>
            <ProductID>P-9474V-8.0.5</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9474V-8.0.4</ProductID>
            <ProductID>P-9474V-8.0.5</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="56" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="56" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Profitability Management component of Oracle Financial Services Applications (subcomponent: Logging (Apache Log4j)).  Supported versions that are affected are 6.1.1 and  8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Profitability Management.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Profitability Management. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5658V-6.1.1</ProductID>
            <ProductID>P-5658V-8.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5658V-6.1.1</ProductID>
            <ProductID>P-5658V-8.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="57" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="57" Title="Details" Type="Details">Vulnerability in the Oracle Fusion Middleware MapViewer component of Oracle Fusion Middleware (subcomponent: Install (Apache Log4j)).  Supported versions that are affected are 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer.  Successful attacks of this vulnerability can result in takeover of Oracle Fusion Middleware MapViewer. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1215V-12.2.1.2</ProductID>
            <ProductID>P-1215V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1215V-12.2.1.2</ProductID>
            <ProductID>P-1215V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="58" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="58" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration component of Oracle Insurance Applications (subcomponent: Policy Administration (Apache Log4j)).  Supported versions that are affected are 10.0, 10.1, 10.2 and  11.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration.  Successful attacks of this vulnerability can result in takeover of Oracle Insurance Policy Administration. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5279V-10.0</ProductID>
            <ProductID>P-5279V-10.1</ProductID>
            <ProductID>P-5279V-10.2</ProductID>
            <ProductID>P-5279V-11.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5279V-10.0</ProductID>
            <ProductID>P-5279V-10.1</ProductID>
            <ProductID>P-5279V-10.2</ProductID>
            <ProductID>P-5279V-11.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="59" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="59" Title="Details" Type="Details">Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Service Manager (Apache Log4j)).  Supported versions that are affected are 3.4.7.4297 and prior, 4.0.4.5235 and prior and  8.0.0.8131 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via Log4j to compromise MySQL Enterprise Monitor.  Successful attacks of this vulnerability can result in takeover of MySQL Enterprise Monitor. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8480V-3.4.7.4297 and prior</ProductID>
            <ProductID>P-8480V-4.0.4.5235 and prior</ProductID>
            <ProductID>P-8480V-8.0.0.8131 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8480V-3.4.7.4297 and prior</ProductID>
            <ProductID>P-8480V-4.0.4.5235 and prior</ProductID>
            <ProductID>P-8480V-8.0.0.8131 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="60" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="60" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise FIN Install component of Oracle PeopleSoft Products (subcomponent: Security (Apache Log4j)).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Install.  Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise FIN Install. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8925V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8925V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="61" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="61" Title="Details" Type="Details">Vulnerability in the Oracle Policy Automation component of Oracle Policy Automation (subcomponent: Determinations Engine (Apache Log4j)).  Supported versions that are affected are 10.4.7, 12.1.0, 12.1.1, 12.2.0, 12.2.1, 12.2.2, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7, 12.2.8, 12.2.9 and  12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Policy Automation.  Successful attacks of this vulnerability can result in takeover of Oracle Policy Automation. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5624V-10.4.7</ProductID>
            <ProductID>P-5624V-12.1.0</ProductID>
            <ProductID>P-5624V-12.1.1</ProductID>
            <ProductID>P-5624V-12.2.0</ProductID>
            <ProductID>P-5624V-12.2.1</ProductID>
            <ProductID>P-5624V-12.2.2</ProductID>
            <ProductID>P-5624V-12.2.3</ProductID>
            <ProductID>P-5624V-12.2.4</ProductID>
            <ProductID>P-5624V-12.2.5</ProductID>
            <ProductID>P-5624V-12.2.6</ProductID>
            <ProductID>P-5624V-12.2.7</ProductID>
            <ProductID>P-5624V-12.2.8</ProductID>
            <ProductID>P-5624V-12.2.9</ProductID>
            <ProductID>P-5624V-12.2.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5624V-10.4.7</ProductID>
            <ProductID>P-5624V-12.1.0</ProductID>
            <ProductID>P-5624V-12.1.1</ProductID>
            <ProductID>P-5624V-12.2.0</ProductID>
            <ProductID>P-5624V-12.2.1</ProductID>
            <ProductID>P-5624V-12.2.2</ProductID>
            <ProductID>P-5624V-12.2.3</ProductID>
            <ProductID>P-5624V-12.2.4</ProductID>
            <ProductID>P-5624V-12.2.5</ProductID>
            <ProductID>P-5624V-12.2.6</ProductID>
            <ProductID>P-5624V-12.2.7</ProductID>
            <ProductID>P-5624V-12.2.8</ProductID>
            <ProductID>P-5624V-12.2.9</ProductID>
            <ProductID>P-5624V-12.2.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="62" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="62" Title="Details" Type="Details">Vulnerability in the Oracle Policy Automation Connector for Siebel component of Oracle Policy Automation (subcomponent: Core (Apache Log4j)).   The supported version that is affected is 10.4.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Policy Automation Connector for Siebel.  Successful attacks of this vulnerability can result in takeover of Oracle Policy Automation Connector for Siebel. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5627V-10.4.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5627V-10.4.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="63" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="63" Title="Details" Type="Details">Vulnerability in the Oracle Policy Automation for Mobile Devices component of Oracle Policy Automation (subcomponent: Core (Apache Log4j)).  Supported versions that are affected are 10.4.7, 12.1.0, 12.1.1, 12.2.0, 12.2.1, 12.2.2, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7, 12.2.8, 12.2.9 and  12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Policy Automation for Mobile Devices.  Successful attacks of this vulnerability can result in takeover of Oracle Policy Automation for Mobile Devices. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5626V-10.4.7</ProductID>
            <ProductID>P-5626V-12.1.0</ProductID>
            <ProductID>P-5626V-12.1.1</ProductID>
            <ProductID>P-5626V-12.2.0</ProductID>
            <ProductID>P-5626V-12.2.1</ProductID>
            <ProductID>P-5626V-12.2.2</ProductID>
            <ProductID>P-5626V-12.2.3</ProductID>
            <ProductID>P-5626V-12.2.4</ProductID>
            <ProductID>P-5626V-12.2.5</ProductID>
            <ProductID>P-5626V-12.2.6</ProductID>
            <ProductID>P-5626V-12.2.7</ProductID>
            <ProductID>P-5626V-12.2.8</ProductID>
            <ProductID>P-5626V-12.2.9</ProductID>
            <ProductID>P-5626V-12.2.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5626V-10.4.7</ProductID>
            <ProductID>P-5626V-12.1.0</ProductID>
            <ProductID>P-5626V-12.1.1</ProductID>
            <ProductID>P-5626V-12.2.0</ProductID>
            <ProductID>P-5626V-12.2.1</ProductID>
            <ProductID>P-5626V-12.2.2</ProductID>
            <ProductID>P-5626V-12.2.3</ProductID>
            <ProductID>P-5626V-12.2.4</ProductID>
            <ProductID>P-5626V-12.2.5</ProductID>
            <ProductID>P-5626V-12.2.6</ProductID>
            <ProductID>P-5626V-12.2.7</ProductID>
            <ProductID>P-5626V-12.2.8</ProductID>
            <ProductID>P-5626V-12.2.9</ProductID>
            <ProductID>P-5626V-12.2.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="64" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="64" Title="Details" Type="Details">Vulnerability in the Oracle Retail Clearance Optimization Engine component of Oracle Retail Applications (subcomponent: General Application (Apache Log4j)).   The supported version that is affected is 14.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Clearance Optimization Engine.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Clearance Optimization Engine. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5256V-14.0.5</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5256V-14.0.5</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="65" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="65" Title="Details" Type="Details">Vulnerability in the Oracle Retail Financial Integration component of Oracle Retail Applications (subcomponent: PeopleSoft Integration Bugs (Apache Log4j)).  Supported versions that are affected are 13.2.x, 14.0.x, 14.1.x, 15.0.x, 16.0.x and 16.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Financial Integration.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Financial Integration. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10722V-13.2.x</ProductID>
            <ProductID>P-10722V-14.0.x</ProductID>
            <ProductID>P-10722V-14.1.x</ProductID>
            <ProductID>P-10722V-15.0.x</ProductID>
            <ProductID>P-10722V-16.0.x</ProductID>
            <ProductID>P-10722V-16.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10722V-13.2.x</ProductID>
            <ProductID>P-10722V-14.0.x</ProductID>
            <ProductID>P-10722V-14.1.x</ProductID>
            <ProductID>P-10722V-15.0.x</ProductID>
            <ProductID>P-10722V-16.0.x</ProductID>
            <ProductID>P-10722V-16.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="66" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="66" Title="Details" Type="Details">Vulnerability in the Oracle Retail Integration Bus component of Oracle Retail Applications (subcomponent: RIB Kernal (Apache Log4j)).  Supported versions that are affected are 12.0.x, 
13.0.x, 
13.1.x, 
13.2.x, 
14.0.0
14.1.0, 
15.0 and  
16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Integration Bus.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Integration Bus. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1807V-12.0.x</ProductID>
            <ProductID>P-1807V-13.0.x</ProductID>
            <ProductID>P-1807V-13.1.x</ProductID>
            <ProductID>P-1807V-13.2.x</ProductID>
            <ProductID>P-1807V-14.0.014.1.0</ProductID>
            <ProductID>P-1807V-15.0</ProductID>
            <ProductID>P-1807V-16.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1807V-12.0.x</ProductID>
            <ProductID>P-1807V-13.0.x</ProductID>
            <ProductID>P-1807V-13.1.x</ProductID>
            <ProductID>P-1807V-13.2.x</ProductID>
            <ProductID>P-1807V-14.0.014.1.0</ProductID>
            <ProductID>P-1807V-15.0</ProductID>
            <ProductID>P-1807V-16.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="67" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="67" Title="Details" Type="Details">Vulnerability in the Oracle Retail Predictive Application Server component of Oracle Retail Applications (subcomponent: RPAS Fusion Client (Apache Log4j)).   The supported version that is affected is 15.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Predictive Application Server.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Predictive Application Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1823V-15.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1823V-15.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="68" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="68" Title="Details" Type="Details">Vulnerability in the Oracle Retail Service Backbone component of Oracle Retail Applications (subcomponent: Install (Apache Log4j)).  Supported versions that are affected are 14.0.x, 14.1.x, 15.0.x and 16.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Service Backbone.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Service Backbone. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10867V-14.0.x</ProductID>
            <ProductID>P-10867V-14.1.x</ProductID>
            <ProductID>P-10867V-15.0.x</ProductID>
            <ProductID>P-10867V-16.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10867V-14.0.x</ProductID>
            <ProductID>P-10867V-14.1.x</ProductID>
            <ProductID>P-10867V-15.0.x</ProductID>
            <ProductID>P-10867V-16.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="69" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="69" Title="Details" Type="Details">Vulnerability in the Oracle Retail Service Layer component of Oracle Retail Applications (subcomponent: Installation (Apache Log4j)).  Supported versions that are affected are 12.0.x, 
13.0.x, 
13.1.x, 
13.2.x and 
14.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Service Layer.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Service Layer. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1836V-12.0.x</ProductID>
            <ProductID>P-1836V-13.0.x</ProductID>
            <ProductID>P-1836V-13.1.x</ProductID>
            <ProductID>P-1836V-13.2.x</ProductID>
            <ProductID>P-1836V-14.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1836V-12.0.x</ProductID>
            <ProductID>P-1836V-13.0.x</ProductID>
            <ProductID>P-1836V-13.1.x</ProductID>
            <ProductID>P-1836V-13.2.x</ProductID>
            <ProductID>P-1836V-14.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="70" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="70" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Network Management System component of Oracle Utilities Applications (subcomponent: Logging (Apache Log4j)).  Supported versions that are affected are 1.12.x and  2.3.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Network Management System.  Successful attacks of this vulnerability can result in takeover of Oracle Utilities Network Management System. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2241V-1.12.x</ProductID>
            <ProductID>P-2241V-2.3.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2241V-1.12.x</ProductID>
            <ProductID>P-2241V-2.3.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="71" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="71" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Work and Asset Management component of Oracle Utilities Applications (subcomponent: Logging (Apache Log4j)).   The supported version that is affected is 1.9.1.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Work and Asset Management.  Successful attacks of this vulnerability can result in takeover of Oracle Utilities Work and Asset Management. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2244V-1.9.1.2.12</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2244V-1.9.1.2.12</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="72" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5662</Title>
      <Notes>
         <Note Audience="All" Ordinal="72" Title="Details" Type="Details">Vulnerability in the Oracle Agile PLM MCAD Connector component of Oracle Supply Chain Products Suite (subcomponent: CAX Client (Apache Batik)).  Supported versions that are affected are 3.3, 3.4, 3.5 and  3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM MCAD Connector.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Agile PLM MCAD Connector accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Agile PLM MCAD Connector. CVSS 3.0 Base Score 7.3 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5662</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4440V-3.3</ProductID>
            <ProductID>P-4440V-3.4</ProductID>
            <ProductID>P-4440V-3.5</ProductID>
            <ProductID>P-4440V-3.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4440V-3.3</ProductID>
            <ProductID>P-4440V-3.4</ProductID>
            <ProductID>P-4440V-3.5</ProductID>
            <ProductID>P-4440V-3.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="73" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5662</Title>
      <Notes>
         <Note Audience="All" Ordinal="73" Title="Details" Type="Details">Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) component of Oracle Communications Applications (subcomponent: Security (Apache Batik)).  Supported versions that are affected are 7.x and  8.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR).  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications Diameter Signaling Router (DSR) accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Diameter Signaling Router (DSR). CVSS 3.0 Base Score 7.3 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5662</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10899V-7.x</ProductID>
            <ProductID>P-10899V-8.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10899V-7.x</ProductID>
            <ProductID>P-10899V-8.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="74" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5662</Title>
      <Notes>
         <Note Audience="All" Ordinal="74" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Network Management System component of Oracle Utilities Applications (subcomponent: Install (Apache Batik)).  Supported versions that are affected are 1.12.x and  2.3.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Utilities Network Management System.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Utilities Network Management System accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Utilities Network Management System. CVSS 3.0 Base Score 7.3 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5662</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2241V-1.12.x</ProductID>
            <ProductID>P-2241V-2.3.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2241V-1.12.x</ProductID>
            <ProductID>P-2241V-2.3.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="75" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5664</Title>
      <Notes>
         <Note Audience="All" Ordinal="75" Title="Details" Type="Details">Vulnerability in the Oracle Retail Convenience and Fuel POS Software component of Oracle Retail Applications (subcomponent: OPT Server (Apache Tomcat)).   The supported version that is affected is 2.1.132. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Convenience and Fuel POS Software.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Retail Convenience and Fuel POS Software accessible data. CVSS 3.0 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5664</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11515V-2.1.132</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11515V-2.1.132</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="76" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-6074</Title>
      <Notes>
         <Note Audience="All" Ordinal="76" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Border Controller component of Oracle Communications Applications (subcomponent: Security (Kernel)).  Supported versions that are affected are ECz7.x and  ECz8.x. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Session Border Controller executes to compromise Oracle Communications Session Border Controller.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Session Border Controller. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-6074</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10750V-ECz7.x</ProductID>
            <ProductID>P-10750V-ECz8.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10750V-ECz7.x</ProductID>
            <ProductID>P-10750V-ECz8.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="77" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-7525</Title>
      <Notes>
         <Note Audience="All" Ordinal="77" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management component of Oracle Communications Applications (subcomponent: Security (Apache Struts 2)).   The supported version that is affected is 12.x. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Policy Management. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-7525</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10900V-12.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="78" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-9798</Title>
      <Notes>
         <Note Audience="All" Ordinal="78" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Products Suite (subcomponent: Installer (Apache HTTP Server)).   The supported version that is affected is 13.2.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Base Platform.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-9798</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-13.2.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1370V-13.2.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="79" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-9798</Title>
      <Notes>
         <Note Audience="All" Ordinal="79" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center component of Oracle Enterprise Manager Products Suite (subcomponent: Networking (Apache HTTP Server)).  Supported versions that are affected are 12.2.2 and  12.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Enterprise Manager Ops Center accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-9798</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.2.2</ProductID>
            <ProductID>P-9835V-12.3.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9835V-12.2.2</ProductID>
            <ProductID>P-9835V-12.3.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="80" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="80" Title="Details" Type="Details">Vulnerability in the Oracle API Gateway component of Oracle Fusion Middleware (subcomponent: Oracle API Gateway (OpenSSL)).   The supported version that is affected is 11.1.2.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle API Gateway.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle API Gateway. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9195V-11.1.2.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9195V-11.1.2.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="81" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="81" Title="Details" Type="Details">Vulnerability in the Oracle Agile Engineering Data Management component of Oracle Supply Chain Products Suite (subcomponent: Install (OpenSSL)).  Supported versions that are affected are 6.1.3, 6.2.0 and  6.2.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile Engineering Data Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Agile Engineering Data Management. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4436V-6.1.3</ProductID>
            <ProductID>P-4436V-6.2.0</ProductID>
            <ProductID>P-4436V-6.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4436V-6.1.3</ProductID>
            <ProductID>P-4436V-6.2.0</ProductID>
            <ProductID>P-4436V-6.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="82" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="82" Title="Details" Type="Details">Vulnerability in the Oracle Communications Network Charging and Control component of Oracle Communications Applications (subcomponent: Security (OpenSSL)).  Supported versions that are affected are 4.4.1.5.0, 5.0.0.1.0, 5.0.0.2.0, 5.0.1.0.0 and  5.0.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Communications Network Charging and Control.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Network Charging and Control. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4623V-4.4.1.5.0</ProductID>
            <ProductID>P-4623V-5.0.0.1.0</ProductID>
            <ProductID>P-4623V-5.0.0.2.0</ProductID>
            <ProductID>P-4623V-5.0.1.0.0</ProductID>
            <ProductID>P-4623V-5.0.2.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4623V-4.4.1.5.0</ProductID>
            <ProductID>P-4623V-5.0.0.1.0</ProductID>
            <ProductID>P-4623V-5.0.0.2.0</ProductID>
            <ProductID>P-4623V-5.0.1.0.0</ProductID>
            <ProductID>P-4623V-5.0.2.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="83" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="83" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center component of Oracle Enterprise Manager Products Suite (subcomponent: Networking (OpenSSL)).  Supported versions that are affected are 12.2.2 and  12.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Enterprise Manager Ops Center.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Enterprise Manager Ops Center. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.2.2</ProductID>
            <ProductID>P-9835V-12.3.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9835V-12.2.2</ProductID>
            <ProductID>P-9835V-12.3.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="84" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="84" Title="Details" Type="Details">Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/ODBC (OpenSSL)).  Supported versions that are affected are 5.3.10 and prior and  
8.0.11 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise MySQL Connectors.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8576V-5.3.10 and prior</ProductID>
            <ProductID>P-8576V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8576V-5.3.10 and prior</ProductID>
            <ProductID>P-8576V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="85" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="85" Title="Details" Type="Details">Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Monitoring: General (OpenSSL)).  Supported versions that are affected are 3.4.7.4297 and prior, 4.0.4.5235 and prior and  8.0.0.8131 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise MySQL Enterprise Monitor.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Enterprise Monitor. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8480V-3.4.7.4297 and prior</ProductID>
            <ProductID>P-8480V-4.0.4.5235 and prior</ProductID>
            <ProductID>P-8480V-8.0.0.8131 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8480V-3.4.7.4297 and prior</ProductID>
            <ProductID>P-8480V-4.0.4.5235 and prior</ProductID>
            <ProductID>P-8480V-8.0.0.8131 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="86" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="86" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Installing (OpenSSL)).  Supported versions that are affected are 5.6.40 and prior, 
5.7.22 and prior and  
8.0.11 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="87" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="87" Title="Details" Type="Details">Vulnerability in the MySQL Workbench component of Oracle MySQL (subcomponent: Workbench: Security:
Encryption (OpenSSL)).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Workbench.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Workbench. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4627V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4627V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="88" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="88" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Security (OpenSSL)).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="89" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="89" Title="Details" Type="Details">Vulnerability in the Oracle Secure Global Desktop component of Oracle Virtualization (subcomponent: Core (OpenSSL)).  Supported versions that are affected are 5.3 and  5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Secure Global Desktop.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Secure Global Desktop. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8539V-5.3</ProductID>
            <ProductID>P-8539V-5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8539V-5.3</ProductID>
            <ProductID>P-8539V-5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="90" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="90" Title="Details" Type="Details">Vulnerability in the Oracle Transportation Management component of Oracle Supply Chain Products Suite (subcomponent: Install (OpenSSL)).   The supported version that is affected is 6.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Transportation Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Transportation Management. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1991V-6.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1991V-6.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="91" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0739</Title>
      <Notes>
         <Note Audience="All" Ordinal="91" Title="Details" Type="Details">Vulnerability in the Oracle Tuxedo component of Oracle Fusion Middleware (subcomponent: SSL/TLS (OpenSSL)).   The supported version that is affected is 12.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Tuxedo.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Tuxedo. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5433V-12.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5433V-12.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="92" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1000300</Title>
      <Notes>
         <Note Audience="All" Ordinal="92" Title="Details" Type="Details">Vulnerability in the OSS Support Tools component of Oracle Support Tools (subcomponent: Services Tools Bundle (curl)).   The supported version that is affected is Prior to 18.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise OSS Support Tools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of OSS Support Tools. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1000300</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1330V-Prior to 18.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1330V-Prior to 18.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="93" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1000300</Title>
      <Notes>
         <Note Audience="All" Ordinal="93" Title="Details" Type="Details">Vulnerability in the Oracle Secure Global Desktop component of Oracle Virtualization (subcomponent: Core (curl)).  Supported versions that are affected are 5.3 and  5.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Secure Global Desktop.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Secure Global Desktop. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1000300</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8539V-5.3</ProductID>
            <ProductID>P-8539V-5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8539V-5.3</ProductID>
            <ProductID>P-8539V-5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="94" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1171</Title>
      <Notes>
         <Note Audience="All" Ordinal="94" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel).  Supported versions that are affected are 10 and  11.3. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris.  Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="95" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="95" Title="Details" Type="Details">Vulnerability in the Oracle Application Testing Suite component of Oracle Enterprise Manager Products Suite (subcomponent: Load Testing for Web Apps (Spring Framework)).   The supported version that is affected is 10.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Testing Suite.  Successful attacks of this vulnerability can result in takeover of Oracle Application Testing Suite. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4622V-10.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4622V-10.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="96" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="96" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center component of Oracle Enterprise Manager Products Suite (subcomponent: Networking (Spring Framework)).  Supported versions that are affected are 12.2.2 and  12.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager Ops Center. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.2.2</ProductID>
            <ProductID>P-9835V-12.3.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9835V-12.2.2</ProductID>
            <ProductID>P-9835V-12.3.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="97" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="97" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Repository component of Oracle Fusion Middleware (subcomponent: Security Subsystem (Spring Framework)).  Supported versions that are affected are 11.1.1.7.0 and  12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Repository.  Successful attacks of this vulnerability can result in takeover of Oracle Enterprise Repository. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5326V-11.1.1.7.0</ProductID>
            <ProductID>P-5326V-12.1.3.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5326V-11.1.1.7.0</ProductID>
            <ProductID>P-5326V-12.1.3.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="98" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="98" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure component of Oracle Financial Services Applications (subcomponent: Inline Processing Engine (Spring Framework)).   The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Analytical Applications Infrastructure.  Note: Please refer MOS document (&lt;a href="https://support.oracle.com/rs?type=doc&amp;id=2380553.1"&gt;Doc ID 2380553.1)&lt;/a&gt; for applicability across other Oracle Financial Services products. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-8.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5680V-8.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="99" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="99" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Behavior Detection Platform component of Oracle Financial Services Applications (subcomponent: Admin Tool (Spring Framework)).   The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Behavior Detection Platform.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Behavior Detection Platform. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9190V-8.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9190V-8.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="100" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="100" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration component of Oracle Insurance Applications (subcomponent: Policy Administration (Spring Framework)).  Supported versions that are affected are 10.0, 10.1, 10.2 and  11.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration.  Successful attacks of this vulnerability can result in takeover of Oracle Insurance Policy Administration. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5279V-10.0</ProductID>
            <ProductID>P-5279V-10.1</ProductID>
            <ProductID>P-5279V-10.2</ProductID>
            <ProductID>P-5279V-11.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5279V-10.0</ProductID>
            <ProductID>P-5279V-10.1</ProductID>
            <ProductID>P-5279V-10.2</ProductID>
            <ProductID>P-5279V-11.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="101" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="101" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise FIN Install component of Oracle PeopleSoft Products (subcomponent: Security (Spring Framework)).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Install.  Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise FIN Install. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8925V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8925V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="102" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="102" Title="Details" Type="Details">Vulnerability in the Oracle Retail Back Office component of Oracle Retail Applications (subcomponent: Security (Spring Framework)).  Supported versions that are affected are 14.0 and 14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Back Office.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Back Office. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2013V-14.0</ProductID>
            <ProductID>P-2013V-14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2013V-14.0</ProductID>
            <ProductID>P-2013V-14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="103" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="103" Title="Details" Type="Details">Vulnerability in the Oracle Retail Central Office component of Oracle Retail Applications (subcomponent: Security (Spring Framework)).  Supported versions that are affected are 14.0 and 14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Central Office.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Central Office. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2016V-14.0</ProductID>
            <ProductID>P-2016V-14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2016V-14.0</ProductID>
            <ProductID>P-2016V-14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="104" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="104" Title="Details" Type="Details">Vulnerability in the Oracle Retail Point-of-Service component of Oracle Retail Applications (subcomponent: Infrastructure (Spring Framework)).  Supported versions that are affected are 14.0 and 14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Point-of-Service.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Point-of-Service. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2017V-14.0</ProductID>
            <ProductID>P-2017V-14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2017V-14.0</ProductID>
            <ProductID>P-2017V-14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="105" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="105" Title="Details" Type="Details">Vulnerability in the Oracle Retail Returns Management component of Oracle Retail Applications (subcomponent: Security (Spring Framework)).  Supported versions that are affected are 14.0 and 14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Returns Management.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Returns Management. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2020V-14.0</ProductID>
            <ProductID>P-2020V-14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2020V-14.0</ProductID>
            <ProductID>P-2020V-14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="106" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="106" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Sample apps (Spring Framework)).  Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="107" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1305</Title>
      <Notes>
         <Note Audience="All" Ordinal="107" Title="Details" Type="Details">Vulnerability in the Oracle Secure Global Desktop component of Oracle Virtualization (subcomponent: Application Server (Apache Tomcat)).  Supported versions that are affected are 5.3 and  5.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Secure Global Desktop.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Secure Global Desktop accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1305</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8539V-5.3</ProductID>
            <ProductID>P-8539V-5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8539V-5.3</ProductID>
            <ProductID>P-8539V-5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="108" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2598</Title>
      <Notes>
         <Note Audience="All" Ordinal="108" Title="Details" Type="Details">Vulnerability in the MySQL Workbench component of Oracle MySQL (subcomponent: Workbench: Security: Encryption).  Supported versions that are affected are 6.3.10 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Workbench.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Workbench accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2598</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4627V-6.3.10 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4627V-6.3.10 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="109" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2767</Title>
      <Notes>
         <Note Audience="All" Ordinal="109" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption).  Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and  5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2767</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.1</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="110" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2881</Title>
      <Notes>
         <Note Audience="All" Ordinal="110" Title="Details" Type="Details">Vulnerability in the MICROS Retail-J component of Oracle Retail Applications (subcomponent: Database).  Supported versions that are affected are 11.0.x, 12.0.x, 12.1.x, 12.1.1.x,  12.1.2.x and  13.1.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise MICROS Retail-J.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MICROS Retail-J accessible data as well as  unauthorized read access to a subset of MICROS Retail-J accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MICROS Retail-J. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2881</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11567V-11.0.x</ProductID>
            <ProductID>P-11567V-12.0.x</ProductID>
            <ProductID>P-11567V-12.1.x</ProductID>
            <ProductID>P-11567V-12.1.1.x</ProductID>
            <ProductID>P-11567V-12.1.2.x</ProductID>
            <ProductID>P-11567V-13.1.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11567V-11.0.x</ProductID>
            <ProductID>P-11567V-12.0.x</ProductID>
            <ProductID>P-11567V-12.1.x</ProductID>
            <ProductID>P-11567V-12.1.1.x</ProductID>
            <ProductID>P-11567V-12.1.2.x</ProductID>
            <ProductID>P-11567V-13.1.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="111" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2882</Title>
      <Notes>
         <Note Audience="All" Ordinal="111" Title="Details" Type="Details">Vulnerability in the MICROS Retail-J component of Oracle Retail Applications (subcomponent: Interfaces).  Supported versions that are affected are 10.2.x, 11.0.x, 12.0.x,12.1.x,
12.1.1.x,12.1.2.x and  13.1.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise MICROS Retail-J.  While the vulnerability is in MICROS Retail-J, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all MICROS Retail-J accessible data. CVSS 3.0 Base Score 7.7 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2882</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11567V-10.2.x</ProductID>
            <ProductID>P-11567V-11.0.x</ProductID>
            <ProductID>P-11567V-12.0.x</ProductID>
            <ProductID>P-11567V-12.1.x</ProductID>
            <ProductID>P-11567V-12.1.1.x</ProductID>
            <ProductID>P-11567V-12.1.2.x</ProductID>
            <ProductID>P-11567V-13.1.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11567V-10.2.x</ProductID>
            <ProductID>P-11567V-11.0.x</ProductID>
            <ProductID>P-11567V-12.0.x</ProductID>
            <ProductID>P-11567V-12.1.x</ProductID>
            <ProductID>P-11567V-12.1.1.x</ProductID>
            <ProductID>P-11567V-12.1.2.x</ProductID>
            <ProductID>P-11567V-13.1.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="112" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2888</Title>
      <Notes>
         <Note Audience="All" Ordinal="112" Title="Details" Type="Details">Vulnerability in the MICROS Retail-J component of Oracle Retail Applications (subcomponent: Back Office).  Supported versions that are affected are 10.2.x, 11.0.x, 12.0.x, 12.1.x,
12.1.1.x,12.1.2.x and  13.1.x. Difficult to exploit vulnerability allows physical access to compromise MICROS Retail-J.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MICROS Retail-J, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all MICROS Retail-J accessible data as well as  unauthorized access to critical data or complete access to all MICROS Retail-J accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MICROS Retail-J. CVSS 3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2888</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11567V-10.2.x</ProductID>
            <ProductID>P-11567V-11.0.x</ProductID>
            <ProductID>P-11567V-12.0.x</ProductID>
            <ProductID>P-11567V-12.1.x</ProductID>
            <ProductID>P-11567V-12.1.1.x</ProductID>
            <ProductID>P-11567V-12.1.2.x</ProductID>
            <ProductID>P-11567V-13.1.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.7</BaseScore>
            <Vector>AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11567V-10.2.x</ProductID>
            <ProductID>P-11567V-11.0.x</ProductID>
            <ProductID>P-11567V-12.0.x</ProductID>
            <ProductID>P-11567V-12.1.x</ProductID>
            <ProductID>P-11567V-12.1.1.x</ProductID>
            <ProductID>P-11567V-12.1.2.x</ProductID>
            <ProductID>P-11567V-13.1.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="113" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2891</Title>
      <Notes>
         <Note Audience="All" Ordinal="113" Title="Details" Type="Details">Vulnerability in the Oracle Retail Bulk Data Integration component of Oracle Retail Applications (subcomponent: BDI Job Scheduler).   The supported version that is affected is 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Bulk Data Integration.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Retail Bulk Data Integration, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Retail Bulk Data Integration accessible data as well as  unauthorized read access to a subset of Oracle Retail Bulk Data Integration accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2891</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12968V-16.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12968V-16.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="114" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2892</Title>
      <Notes>
         <Note Audience="All" Ordinal="114" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Availability Suite Service).  Supported versions that are affected are 10 and  11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris.  Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2892</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="115" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2893</Title>
      <Notes>
         <Note Audience="All" Ordinal="115" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components).  Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2893</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="116" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2894</Title>
      <Notes>
         <Note Audience="All" Ordinal="116" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services).  Supported versions that are affected are 12.1.3.0, 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2894</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="117" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2895</Title>
      <Notes>
         <Note Audience="All" Ordinal="117" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Corporate Lending, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data as well as  unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2895</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="118" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2896</Title>
      <Notes>
         <Note Audience="All" Ordinal="118" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Payments, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data as well as  unauthorized read access to a subset of Oracle Banking Payments accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2896</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="119" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2897</Title>
      <Notes>
         <Note Audience="All" Ordinal="119" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Enterprise Limits and Collateral Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2897</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="120" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2898</Title>
      <Notes>
         <Note Audience="All" Ordinal="120" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Investor Servicing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2898</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="121" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2899</Title>
      <Notes>
         <Note Audience="All" Ordinal="121" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and  14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2899</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="122" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2900</Title>
      <Notes>
         <Note Audience="All" Ordinal="122" Title="Details" Type="Details">Vulnerability in the BI Publisher component of Oracle Fusion Middleware (subcomponent: Layout Tools).   The supported version that is affected is 11.1.1.7.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all BI Publisher accessible data as well as  unauthorized read access to a subset of BI Publisher accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2900</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-11.1.1.7.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1479V-11.1.1.7.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="123" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2901</Title>
      <Notes>
         <Note Audience="All" Ordinal="123" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel).  Supported versions that are affected are 10 and  11.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via DHCP to compromise Solaris.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2901</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="124" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2903</Title>
      <Notes>
         <Note Audience="All" Ordinal="124" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel).  Supported versions that are affected are 10 and  11.3. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Solaris accessible data. CVSS 3.0 Base Score 4.4 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2903</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.4</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="125" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2904</Title>
      <Notes>
         <Note Audience="All" Ordinal="125" Title="Details" Type="Details">Vulnerability in the Oracle Communications EAGLE LNP Application Processor component of Oracle Communications Applications (subcomponent: GUI).   The supported version that is affected is 10.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications EAGLE LNP Application Processor.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications EAGLE LNP Application Processor accessible data as well as  unauthorized read access to a subset of Oracle Communications EAGLE LNP Application Processor accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2904</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11118V-10.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11118V-10.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="126" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2905</Title>
      <Notes>
         <Note Audience="All" Ordinal="126" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: Core Services).   The supported version that is affected is Prior to 8.7.20. Easily exploitable vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Sun ZFS Storage Appliance Kit (AK).  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2905</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.20</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.20</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="127" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2906</Title>
      <Notes>
         <Note Audience="All" Ordinal="127" Title="Details" Type="Details">Vulnerability in the Hardware Management Pack component of Oracle Sun Systems Products Suite (subcomponent: Ipmitool).   The supported version that is affected is 11.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via IPMI to compromise Hardware Management Pack.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Hardware Management Pack accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2906</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10016V-11.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10016V-11.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="128" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2907</Title>
      <Notes>
         <Note Audience="All" Ordinal="128" Title="Details" Type="Details">Vulnerability in the Hyperion Financial Reporting component of Oracle Hyperion (subcomponent: Security Models).   The supported version that is affected is 11.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Hyperion Financial Reporting.  While the vulnerability is in Hyperion Financial Reporting, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Hyperion Financial Reporting accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2907</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8776V-11.1.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8776V-11.1.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="129" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2908</Title>
      <Notes>
         <Note Audience="All" Ordinal="129" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel).   The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with network access via RPC to compromise Solaris.  While the vulnerability is in Solaris, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris. CVSS 3.0 Base Score 7.7 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10006V-11.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="130" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2915</Title>
      <Notes>
         <Note Audience="All" Ordinal="130" Title="Details" Type="Details">Vulnerability in the Hyperion Data Relationship Management component of Oracle Hyperion (subcomponent: Access and security).   The supported version that is affected is 11.1.2.4.330. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Hyperion Data Relationship Management.  While the vulnerability is in Hyperion Data Relationship Management, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Hyperion Data Relationship Management accessible data. CVSS 3.0 Base Score 5.8 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2915</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4375V-11.1.2.4.330</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4375V-11.1.2.4.330</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="131" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2916</Title>
      <Notes>
         <Note Audience="All" Ordinal="131" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks).   The supported version that is affected is Prior to 8.7.18. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK).  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 2.7 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2916</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.7</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="132" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2917</Title>
      <Notes>
         <Note Audience="All" Ordinal="132" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks).   The supported version that is affected is Prior to 8.7.18. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK).  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2917</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="133" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2918</Title>
      <Notes>
         <Note Audience="All" Ordinal="133" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks).   The supported version that is affected is Prior to 8.7.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK).  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2918</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="134" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2919</Title>
      <Notes>
         <Note Audience="All" Ordinal="134" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Unified Navigation).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2919</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="135" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2920</Title>
      <Notes>
         <Note Audience="All" Ordinal="135" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks).   The supported version that is affected is Prior to 8.7.19. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK).  While the vulnerability is in Sun ZFS Storage Appliance Kit (AK), attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Sun ZFS Storage Appliance Kit (AK) accessible data as well as  unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 7.4 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2920</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.19</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.19</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="136" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2921</Title>
      <Notes>
         <Note Audience="All" Ordinal="136" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: User Interface).   The supported version that is affected is Prior to 8.7.18. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance Kit (AK).  While the vulnerability is in Sun ZFS Storage Appliance Kit (AK), attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data. CVSS 3.0 Base Score 5.8 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2921</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="137" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2923</Title>
      <Notes>
         <Note Audience="All" Ordinal="137" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: Core Services).   The supported version that is affected is Prior to 8.7.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Sun ZFS Storage Appliance Kit (AK) executes to compromise Sun ZFS Storage Appliance Kit (AK).  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data. CVSS 3.0 Base Score 2.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2923</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.20</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.3</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.20</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="138" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2924</Title>
      <Notes>
         <Note Audience="All" Ordinal="138" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks).   The supported version that is affected is Prior to 8.7.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Sun ZFS Storage Appliance Kit (AK) executes to compromise Sun ZFS Storage Appliance Kit (AK).  While the vulnerability is in Sun ZFS Storage Appliance Kit (AK), attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Sun ZFS Storage Appliance Kit (AK) accessible data as well as  unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 5.7 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2924</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.7</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="139" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2925</Title>
      <Notes>
         <Note Audience="All" Ordinal="139" Title="Details" Type="Details">Vulnerability in the BI Publisher component of Oracle Fusion Middleware (subcomponent: Web Server).  Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.2.1.2.0 and  12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise BI Publisher.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all BI Publisher accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2925</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-11.1.1.7.0</ProductID>
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
            <ProductID>P-1479V-12.2.1.2.0</ProductID>
            <ProductID>P-1479V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1479V-11.1.1.7.0</ProductID>
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
            <ProductID>P-1479V-12.2.1.2.0</ProductID>
            <ProductID>P-1479V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="140" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2926</Title>
      <Notes>
         <Note Audience="All" Ordinal="140" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: NVIDIA-GFX Kernel driver).   The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with network access via ISCSI to compromise Solaris.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris as well as  unauthorized update, insert or delete access to some of Solaris accessible data and  unauthorized read access to a subset of Solaris accessible data. CVSS 3.0 Base Score 7.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2926</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.6</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10006V-11.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="141" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2927</Title>
      <Notes>
         <Note Audience="All" Ordinal="141" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: HTTP data path subsystems).   The supported version that is affected is Prior to 8.7.18. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Sun ZFS Storage Appliance Kit (AK).  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2927</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="142" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2928</Title>
      <Notes>
         <Note Audience="All" Ordinal="142" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: RAD).   The supported version that is affected is 11.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Solaris accessible data as well as  unauthorized access to critical data or complete access to all Solaris accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2928</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10006V-11.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="143" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2929</Title>
      <Notes>
         <Note Audience="All" Ordinal="143" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2929</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="144" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2930</Title>
      <Notes>
         <Note Audience="All" Ordinal="144" Title="Details" Type="Details">Vulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: NAS device addition).  Supported versions that are affected are 3.3 and  4.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via RPC to compromise Solaris Cluster.  Successful attacks of this vulnerability can result in takeover of Solaris Cluster. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2930</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10005V-3.3</ProductID>
            <ProductID>P-10005V-4.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10005V-3.3</ProductID>
            <ProductID>P-10005V-4.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="145" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2932</Title>
      <Notes>
         <Note Audience="All" Ordinal="145" Title="Details" Type="Details">Vulnerability in the Oracle SuperCluster Specific Software component of Oracle Sun Systems Products Suite (subcomponent: SuperCluster Virtual Assistant).   The supported version that is affected is Prior to 2.5.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle SuperCluster Specific Software.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle SuperCluster Specific Software accessible data as well as  unauthorized update, insert or delete access to some of Oracle SuperCluster Specific Software accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle SuperCluster Specific Software. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2932</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10011V-Prior to 2.5.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10011V-Prior to 2.5.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="146" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2933</Title>
      <Notes>
         <Note Audience="All" Ordinal="146" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components).  Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and  12.2.1.3. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server.  While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as  unauthorized read access to a subset of Oracle WebLogic Server accessible data.  Note: Please refer to MOS document (&lt;a href="https://support.oracle.com/rs?type=doc&amp;id=2421480.1"&gt;Doc ID 2421480.1&lt;/a&gt;) for instructions on how to address this issue. CVSS 3.0 Base Score 4.9 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2933</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="147" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2934</Title>
      <Notes>
         <Note Audience="All" Ordinal="147" Title="Details" Type="Details">Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Attachments / File Upload).   The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2934</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-510V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-510V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="148" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2935</Title>
      <Notes>
         <Note Audience="All" Ordinal="148" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: JSF).  Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as  unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2935</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="149" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2936</Title>
      <Notes>
         <Note Audience="All" Ordinal="149" Title="Details" Type="Details">Vulnerability in the Oracle Communications Messaging Server component of Oracle Communications Applications (subcomponent: Web Client).   The supported version that is affected is 3.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Messaging Server.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Messaging Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Messaging Server accessible data as well as  unauthorized read access to a subset of Oracle Communications Messaging Server accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2936</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8501V-3.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8501V-3.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="150" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2937</Title>
      <Notes>
         <Note Audience="All" Ordinal="150" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: User Interface).   The supported version that is affected is Prior to 8.7.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance Kit (AK).  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Sun ZFS Storage Appliance Kit (AK) accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2937</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.19</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.19</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="151" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2938</Title>
      <Notes>
         <Note Audience="All" Ordinal="151" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB).  Supported versions that are affected are Java SE: 6u191, 7u181 and  8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.  While the vulnerability is in Java SE, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Java SE.  Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2938</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 6u191</ProductID>
            <ProductID>P-856V-7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-856V-Java SE: 6u191</ProductID>
            <ProductID>P-856V-7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="152" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2939</Title>
      <Notes>
         <Note Audience="All" Ordinal="152" Title="Details" Type="Details">Vulnerability in the Core RDBMS component of Oracle Database Server.  Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18.1 and 18.2. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS.  While the vulnerability is in Core RDBMS, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Core RDBMS accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Core RDBMS. CVSS 3.0 Base Score 8.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2939</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
            <ProductID>P-5V-18.1</ProductID>
            <ProductID>P-5V-18.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.4</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
            <ProductID>P-5V-18.1</ProductID>
            <ProductID>P-5V-18.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="153" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2940</Title>
      <Notes>
         <Note Audience="All" Ordinal="153" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and  10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2940</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 6u191</ProductID>
            <ProductID>P-856V-7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
            <ProductID>P-856V-10.0.1; Java SE Embedded: 8u171</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-856V-Java SE: 6u191</ProductID>
            <ProductID>P-856V-7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
            <ProductID>P-856V-10.0.1; Java SE Embedded: 8u171</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="154" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2941</Title>
      <Notes>
         <Note Audience="All" Ordinal="154" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX).  Supported versions that are affected are Java SE: 7u181, 8u172 and  10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2941</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
            <ProductID>P-856V-10.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.3</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-856V-Java SE: 7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
            <ProductID>P-856V-10.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="155" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2942</Title>
      <Notes>
         <Note Audience="All" Ordinal="155" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL).  Supported versions that are affected are Java SE: 7u181 and  8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.  Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2942</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.3</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-856V-Java SE: 7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="156" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2943</Title>
      <Notes>
         <Note Audience="All" Ordinal="156" Title="Details" Type="Details">Vulnerability in the Oracle Fusion Middleware MapViewer component of Oracle Fusion Middleware (subcomponent: Map Builder).  Supported versions that are affected are 12.2.1.2.0 and  12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer.  Successful attacks of this vulnerability can result in takeover of Oracle Fusion Middleware MapViewer. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2943</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1215V-12.2.1.2.0</ProductID>
            <ProductID>P-1215V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.2</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1215V-12.2.1.2.0</ProductID>
            <ProductID>P-1215V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="157" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2944</Title>
      <Notes>
         <Note Audience="All" Ordinal="157" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Monitoring and Diagnostics).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2944</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="158" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2945</Title>
      <Notes>
         <Note Audience="All" Ordinal="158" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2945</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="159" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2946</Title>
      <Notes>
         <Note Audience="All" Ordinal="159" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2946</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="160" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2947</Title>
      <Notes>
         <Note Audience="All" Ordinal="160" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2947</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="161" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2948</Title>
      <Notes>
         <Note Audience="All" Ordinal="161" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2948</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="162" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2949</Title>
      <Notes>
         <Note Audience="All" Ordinal="162" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2949</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="163" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2950</Title>
      <Notes>
         <Note Audience="All" Ordinal="163" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2950</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="164" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2951</Title>
      <Notes>
         <Note Audience="All" Ordinal="164" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Configuration Manager).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.2 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2951</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.2</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="165" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2952</Title>
      <Notes>
         <Note Audience="All" Ordinal="165" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency).  Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and  10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit.  Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2952</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 6u191</ProductID>
            <ProductID>P-856V-7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
            <ProductID>P-856V-10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-856V-Java SE: 6u191</ProductID>
            <ProductID>P-856V-7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
            <ProductID>P-856V-10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="166" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2953</Title>
      <Notes>
         <Note Audience="All" Ordinal="166" Title="Details" Type="Details">Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: Print Server).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as  unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2953</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1379V-12.1.1</ProductID>
            <ProductID>P-1379V-12.1.2</ProductID>
            <ProductID>P-1379V-12.1.3</ProductID>
            <ProductID>P-1379V-12.2.3</ProductID>
            <ProductID>P-1379V-12.2.4</ProductID>
            <ProductID>P-1379V-12.2.5</ProductID>
            <ProductID>P-1379V-12.2.6</ProductID>
            <ProductID>P-1379V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1379V-12.1.1</ProductID>
            <ProductID>P-1379V-12.1.2</ProductID>
            <ProductID>P-1379V-12.1.3</ProductID>
            <ProductID>P-1379V-12.2.3</ProductID>
            <ProductID>P-1379V-12.2.4</ProductID>
            <ProductID>P-1379V-12.2.5</ProductID>
            <ProductID>P-1379V-12.2.6</ProductID>
            <ProductID>P-1379V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="167" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2954</Title>
      <Notes>
         <Note Audience="All" Ordinal="167" Title="Details" Type="Details">Vulnerability in the Oracle Order Management component of Oracle E-Business Suite (subcomponent: Product Diagnostic Tools).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Order Management executes to compromise Oracle Order Management.  Successful attacks of this vulnerability can result in takeover of Oracle Order Management. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2954</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-497V-12.1.1</ProductID>
            <ProductID>P-497V-12.1.2</ProductID>
            <ProductID>P-497V-12.1.3</ProductID>
            <ProductID>P-497V-12.2.3</ProductID>
            <ProductID>P-497V-12.2.4</ProductID>
            <ProductID>P-497V-12.2.5</ProductID>
            <ProductID>P-497V-12.2.6</ProductID>
            <ProductID>P-497V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-497V-12.1.1</ProductID>
            <ProductID>P-497V-12.1.2</ProductID>
            <ProductID>P-497V-12.1.3</ProductID>
            <ProductID>P-497V-12.2.3</ProductID>
            <ProductID>P-497V-12.2.4</ProductID>
            <ProductID>P-497V-12.2.5</ProductID>
            <ProductID>P-497V-12.2.6</ProductID>
            <ProductID>P-497V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="168" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2955</Title>
      <Notes>
         <Note Audience="All" Ordinal="168" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Integration).   The supported version that is affected is 5.5.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2955</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11580V-5.5.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11580V-5.5.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="169" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2956</Title>
      <Notes>
         <Note Audience="All" Ordinal="169" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Integration).   The supported version that is affected is 5.5.x. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hospitality OPERA 5 Property Services executes to compromise Oracle Hospitality OPERA 5 Property Services.  While the vulnerability is in Oracle Hospitality OPERA 5 Property Services, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle Hospitality OPERA 5 Property Services. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2956</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11580V-5.5.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11580V-5.5.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="170" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2957</Title>
      <Notes>
         <Note Audience="All" Ordinal="170" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Logging).   The supported version that is affected is 5.5.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2957</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11580V-5.5.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11580V-5.5.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="171" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2958</Title>
      <Notes>
         <Note Audience="All" Ordinal="171" Title="Details" Type="Details">Vulnerability in the BI Publisher component of Oracle Fusion Middleware (subcomponent: BI Publisher Security).  Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.2.1.2.0 and  12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all BI Publisher accessible data as well as  unauthorized read access to a subset of BI Publisher accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2958</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-11.1.1.7.0</ProductID>
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
            <ProductID>P-1479V-12.2.1.2.0</ProductID>
            <ProductID>P-1479V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1479V-11.1.1.7.0</ProductID>
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
            <ProductID>P-1479V-12.2.1.2.0</ProductID>
            <ProductID>P-1479V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="172" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2959</Title>
      <Notes>
         <Note Audience="All" Ordinal="172" Title="Details" Type="Details">Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: UIF Open UI).   The supported version that is affected is 18.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Siebel UI Framework accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2959</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9011V-18.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9011V-18.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="173" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2960</Title>
      <Notes>
         <Note Audience="All" Ordinal="173" Title="Details" Type="Details">Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access).  Supported versions that are affected are 8.4, 15.x, 16.x and  17.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as  unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2960</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5579V-8.4</ProductID>
            <ProductID>P-5579V-15.x</ProductID>
            <ProductID>P-5579V-16.x</ProductID>
            <ProductID>P-5579V-17.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5579V-8.4</ProductID>
            <ProductID>P-5579V-15.x</ProductID>
            <ProductID>P-5579V-16.x</ProductID>
            <ProductID>P-5579V-17.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="174" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2961</Title>
      <Notes>
         <Note Audience="All" Ordinal="174" Title="Details" Type="Details">Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access).  Supported versions that are affected are 8.4, 15.x, 16.x and  17.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as  unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2961</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5579V-8.4</ProductID>
            <ProductID>P-5579V-15.x</ProductID>
            <ProductID>P-5579V-16.x</ProductID>
            <ProductID>P-5579V-17.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5579V-8.4</ProductID>
            <ProductID>P-5579V-15.x</ProductID>
            <ProductID>P-5579V-16.x</ProductID>
            <ProductID>P-5579V-17.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="175" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2962</Title>
      <Notes>
         <Note Audience="All" Ordinal="175" Title="Details" Type="Details">Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access).  Supported versions that are affected are 8.4, 15.x, 16.x and  17.x. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as  unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 4.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2962</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5579V-8.4</ProductID>
            <ProductID>P-5579V-15.x</ProductID>
            <ProductID>P-5579V-16.x</ProductID>
            <ProductID>P-5579V-17.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.4</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5579V-8.4</ProductID>
            <ProductID>P-5579V-15.x</ProductID>
            <ProductID>P-5579V-16.x</ProductID>
            <ProductID>P-5579V-17.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="176" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2963</Title>
      <Notes>
         <Note Audience="All" Ordinal="176" Title="Details" Type="Details">Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access).  Supported versions that are affected are 8.4, 15.x and  16.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2963</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5579V-8.4</ProductID>
            <ProductID>P-5579V-15.x</ProductID>
            <ProductID>P-5579V-16.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5579V-8.4</ProductID>
            <ProductID>P-5579V-15.x</ProductID>
            <ProductID>P-5579V-16.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="177" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2964</Title>
      <Notes>
         <Note Audience="All" Ordinal="177" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE: 8u172 and  10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2964</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 8u172</ProductID>
            <ProductID>P-856V-10.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.3</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-856V-Java SE: 8u172</ProductID>
            <ProductID>P-856V-10.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="178" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2965</Title>
      <Notes>
         <Note Audience="All" Ordinal="178" Title="Details" Type="Details">Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Core).   The supported version that is affected is 16.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Unifier, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Primavera Unifier accessible data as well as  unauthorized read access to a subset of Primavera Unifier accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2965</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10354V-16.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="179" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2966</Title>
      <Notes>
         <Note Audience="All" Ordinal="179" Title="Details" Type="Details">Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Core).  Supported versions that are affected are 16.x, 17.x and 18.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Unifier, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Primavera Unifier accessible data. CVSS 3.0 Base Score 7.4 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.4</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="180" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2967</Title>
      <Notes>
         <Note Audience="All" Ordinal="180" Title="Details" Type="Details">Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Core).  Supported versions that are affected are 16.x, 17.x and 18.x. Easily exploitable vulnerability allows physical access to compromise Primavera Unifier.  While the vulnerability is in Primavera Unifier, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Primavera Unifier accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2967</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="181" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2968</Title>
      <Notes>
         <Note Audience="All" Ordinal="181" Title="Details" Type="Details">Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Core).  Supported versions that are affected are 16.x, 17.x and 18.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Primavera Unifier accessible data. CVSS 3.0 Base Score 6.5 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2968</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10354V-16.x</ProductID>
            <ProductID>P-10354V-17.x</ProductID>
            <ProductID>P-10354V-18.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="182" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2969</Title>
      <Notes>
         <Note Audience="All" Ordinal="182" Title="Details" Type="Details">Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Core).   The supported version that is affected is 16.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Primavera Unifier accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2969</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10354V-16.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="183" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2970</Title>
      <Notes>
         <Note Audience="All" Ordinal="183" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Search Functionality).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2970</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="184" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2972</Title>
      <Notes>
         <Note Audience="All" Ordinal="184" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security).   The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Java SE accessible data.  Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2972</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 10.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-856V-Java SE: 10.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="185" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2973</Title>
      <Notes>
         <Note Audience="All" Ordinal="185" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE).  Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and  10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2973</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 6u191</ProductID>
            <ProductID>P-856V-7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
            <ProductID>P-856V-10.0.1; Java SE Embedded: 8u171</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-856V-Java SE: 6u191</ProductID>
            <ProductID>P-856V-7u181</ProductID>
            <ProductID>P-856V-8u172</ProductID>
            <ProductID>P-856V-10.0.1; Java SE Embedded: 8u171</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="186" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2974</Title>
      <Notes>
         <Note Audience="All" Ordinal="186" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2974</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="187" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2975</Title>
      <Notes>
         <Note Audience="All" Ordinal="187" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2975</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="188" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2976</Title>
      <Notes>
         <Note Audience="All" Ordinal="188" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center component of Oracle Enterprise Manager Products Suite (subcomponent: Networking).   The supported version that is affected is 12.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Enterprise Manager Ops Center accessible data as well as  unauthorized update, insert or delete access to some of Enterprise Manager Ops Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2976</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9835V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="189" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2977</Title>
      <Notes>
         <Note Audience="All" Ordinal="189" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2977</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="190" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2979</Title>
      <Notes>
         <Note Audience="All" Ordinal="190" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2979</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="191" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2980</Title>
      <Notes>
         <Note Audience="All" Ordinal="191" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2980</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="192" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2981</Title>
      <Notes>
         <Note Audience="All" Ordinal="192" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2981</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="193" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2982</Title>
      <Notes>
         <Note Audience="All" Ordinal="193" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2982</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="194" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2984</Title>
      <Notes>
         <Note Audience="All" Ordinal="194" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Cruise Fleet Management System component of Oracle Hospitality Applications (subcomponent: Gangway Activity Web App).   The supported version that is affected is 9.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Cruise Fleet Management System.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality Cruise Fleet Management System accessible data as well as  unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management System accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2984</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11608V-9.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11608V-9.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="195" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2985</Title>
      <Notes>
         <Note Audience="All" Ordinal="195" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Workflow).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2985</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="196" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2986</Title>
      <Notes>
         <Note Audience="All" Ordinal="196" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Workflow).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2986</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="197" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2987</Title>
      <Notes>
         <Note Audience="All" Ordinal="197" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Console).  Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as  unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2987</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="198" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2988</Title>
      <Notes>
         <Note Audience="All" Ordinal="198" Title="Details" Type="Details">Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: Products).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as  unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 6.9 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2988</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-229V-12.1.1</ProductID>
            <ProductID>P-229V-12.1.2</ProductID>
            <ProductID>P-229V-12.1.3</ProductID>
            <ProductID>P-229V-12.2.3</ProductID>
            <ProductID>P-229V-12.2.4</ProductID>
            <ProductID>P-229V-12.2.5</ProductID>
            <ProductID>P-229V-12.2.6</ProductID>
            <ProductID>P-229V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-229V-12.1.1</ProductID>
            <ProductID>P-229V-12.1.2</ProductID>
            <ProductID>P-229V-12.1.3</ProductID>
            <ProductID>P-229V-12.2.3</ProductID>
            <ProductID>P-229V-12.2.4</ProductID>
            <ProductID>P-229V-12.2.5</ProductID>
            <ProductID>P-229V-12.2.6</ProductID>
            <ProductID>P-229V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="199" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2989</Title>
      <Notes>
         <Note Audience="All" Ordinal="199" Title="Details" Type="Details">Vulnerability in the Oracle iLearning component of Oracle iLearning (subcomponent: Learner Administration).   The supported version that is affected is 6.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iLearning.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iLearning, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle iLearning accessible data as well as  unauthorized update, insert or delete access to some of Oracle iLearning accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2989</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-902V-6.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-902V-6.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="200" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2990</Title>
      <Notes>
         <Note Audience="All" Ordinal="200" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker).  Supported versions that are affected are 8.55 and  8.56. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2990</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.4</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="201" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2991</Title>
      <Notes>
         <Note Audience="All" Ordinal="201" Title="Details" Type="Details">Vulnerability in the Oracle Trade Management component of Oracle E-Business Suite (subcomponent: User Interface).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as  unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2991</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-765V-12.1.1</ProductID>
            <ProductID>P-765V-12.1.2</ProductID>
            <ProductID>P-765V-12.1.3</ProductID>
            <ProductID>P-765V-12.2.3</ProductID>
            <ProductID>P-765V-12.2.4</ProductID>
            <ProductID>P-765V-12.2.5</ProductID>
            <ProductID>P-765V-12.2.6</ProductID>
            <ProductID>P-765V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-765V-12.1.1</ProductID>
            <ProductID>P-765V-12.1.2</ProductID>
            <ProductID>P-765V-12.1.3</ProductID>
            <ProductID>P-765V-12.2.3</ProductID>
            <ProductID>P-765V-12.2.4</ProductID>
            <ProductID>P-765V-12.2.5</ProductID>
            <ProductID>P-765V-12.2.6</ProductID>
            <ProductID>P-765V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="202" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2992</Title>
      <Notes>
         <Note Audience="All" Ordinal="202" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2992</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="203" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2993</Title>
      <Notes>
         <Note Audience="All" Ordinal="203" Title="Details" Type="Details">Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Preferences).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as  unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2993</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1199V-12.1.1</ProductID>
            <ProductID>P-1199V-12.1.2</ProductID>
            <ProductID>P-1199V-12.1.3</ProductID>
            <ProductID>P-1199V-12.2.3</ProductID>
            <ProductID>P-1199V-12.2.4</ProductID>
            <ProductID>P-1199V-12.2.5</ProductID>
            <ProductID>P-1199V-12.2.6</ProductID>
            <ProductID>P-1199V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1199V-12.1.1</ProductID>
            <ProductID>P-1199V-12.1.2</ProductID>
            <ProductID>P-1199V-12.1.3</ProductID>
            <ProductID>P-1199V-12.2.3</ProductID>
            <ProductID>P-1199V-12.2.4</ProductID>
            <ProductID>P-1199V-12.2.5</ProductID>
            <ProductID>P-1199V-12.2.6</ProductID>
            <ProductID>P-1199V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="204" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2994</Title>
      <Notes>
         <Note Audience="All" Ordinal="204" Title="Details" Type="Details">Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Shopping Cart).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle iStore accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2994</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-384V-12.1.1</ProductID>
            <ProductID>P-384V-12.1.2</ProductID>
            <ProductID>P-384V-12.1.3</ProductID>
            <ProductID>P-384V-12.2.3</ProductID>
            <ProductID>P-384V-12.2.4</ProductID>
            <ProductID>P-384V-12.2.5</ProductID>
            <ProductID>P-384V-12.2.6</ProductID>
            <ProductID>P-384V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-384V-12.1.1</ProductID>
            <ProductID>P-384V-12.1.2</ProductID>
            <ProductID>P-384V-12.1.3</ProductID>
            <ProductID>P-384V-12.2.3</ProductID>
            <ProductID>P-384V-12.2.4</ProductID>
            <ProductID>P-384V-12.2.5</ProductID>
            <ProductID>P-384V-12.2.6</ProductID>
            <ProductID>P-384V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="205" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2995</Title>
      <Notes>
         <Note Audience="All" Ordinal="205" Title="Details" Type="Details">Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Shopping Cart).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as  unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2995</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-384V-12.1.1</ProductID>
            <ProductID>P-384V-12.1.2</ProductID>
            <ProductID>P-384V-12.1.3</ProductID>
            <ProductID>P-384V-12.2.3</ProductID>
            <ProductID>P-384V-12.2.4</ProductID>
            <ProductID>P-384V-12.2.5</ProductID>
            <ProductID>P-384V-12.2.6</ProductID>
            <ProductID>P-384V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-384V-12.1.1</ProductID>
            <ProductID>P-384V-12.1.2</ProductID>
            <ProductID>P-384V-12.1.3</ProductID>
            <ProductID>P-384V-12.2.3</ProductID>
            <ProductID>P-384V-12.2.4</ProductID>
            <ProductID>P-384V-12.2.5</ProductID>
            <ProductID>P-384V-12.2.6</ProductID>
            <ProductID>P-384V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="206" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2996</Title>
      <Notes>
         <Note Audience="All" Ordinal="206" Title="Details" Type="Details">Vulnerability in the Oracle Applications Manager component of Oracle E-Business Suite (subcomponent: Oracle Diagnostics Interfaces).  Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2996</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-99V-12.1.3</ProductID>
            <ProductID>P-99V-12.2.3</ProductID>
            <ProductID>P-99V-12.2.4</ProductID>
            <ProductID>P-99V-12.2.5</ProductID>
            <ProductID>P-99V-12.2.6</ProductID>
            <ProductID>P-99V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-99V-12.1.3</ProductID>
            <ProductID>P-99V-12.2.3</ProductID>
            <ProductID>P-99V-12.2.4</ProductID>
            <ProductID>P-99V-12.2.5</ProductID>
            <ProductID>P-99V-12.2.6</ProductID>
            <ProductID>P-99V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="207" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2997</Title>
      <Notes>
         <Note Audience="All" Ordinal="207" Title="Details" Type="Details">Vulnerability in the Oracle Scripting component of Oracle E-Business Suite (subcomponent: Script Author).  Supported versions that are affected are 12.1.1, 12.1.2 and  12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Scripting.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Scripting, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Scripting accessible data as well as  unauthorized update, insert or delete access to some of Oracle Scripting accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2997</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-433V-12.1.1</ProductID>
            <ProductID>P-433V-12.1.2</ProductID>
            <ProductID>P-433V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-433V-12.1.1</ProductID>
            <ProductID>P-433V-12.1.2</ProductID>
            <ProductID>P-433V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="208" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2998</Title>
      <Notes>
         <Note Audience="All" Ordinal="208" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: SAML).  Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as  unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="209" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2999</Title>
      <Notes>
         <Note Audience="All" Ordinal="209" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2999</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="210" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3000</Title>
      <Notes>
         <Note Audience="All" Ordinal="210" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Cruise Shipboard Property Management System component of Oracle Hospitality Applications (subcomponent: SPMS Suite).   The supported version that is affected is 8.x. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hospitality Cruise Shipboard Property Management System executes to compromise Oracle Hospitality Cruise Shipboard Property Management System.  While the vulnerability is in Oracle Hospitality Cruise Shipboard Property Management System, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Shipboard Property Management System accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3000</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11607V-8.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11607V-8.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="211" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3001</Title>
      <Notes>
         <Note Audience="All" Ordinal="211" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Cruise Shipboard Property Management System component of Oracle Hospitality Applications (subcomponent: SPMS Suite).   The supported version that is affected is 8.x. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hospitality Cruise Shipboard Property Management System executes to compromise Oracle Hospitality Cruise Shipboard Property Management System.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Shipboard Property Management System accessible data. CVSS 3.0 Base Score 6.2 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3001</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11607V-8.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.2</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11607V-8.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="212" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3002</Title>
      <Notes>
         <Note Audience="All" Ordinal="212" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Cruise Fleet Management System component of Oracle Hospitality Applications (subcomponent: Fleet Management System Suite).   The supported version that is affected is 9.x. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hospitality Cruise Fleet Management System executes to compromise Oracle Hospitality Cruise Fleet Management System.  While the vulnerability is in Oracle Hospitality Cruise Fleet Management System, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management System accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3002</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11608V-9.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11608V-9.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="213" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3003</Title>
      <Notes>
         <Note Audience="All" Ordinal="213" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Cruise Fleet Management System component of Oracle Hospitality Applications (subcomponent: Fleet Management System Suite).   The supported version that is affected is 9.x. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hospitality Cruise Fleet Management System executes to compromise Oracle Hospitality Cruise Fleet Management System.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality Cruise Fleet Management System accessible data. CVSS 3.0 Base Score 6.2 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11608V-9.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.2</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11608V-9.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="214" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3004</Title>
      <Notes>
         <Note Audience="All" Ordinal="214" Title="Details" Type="Details">Vulnerability in the Java VM component of Oracle Database Server.  Supported versions that are affected are 11.2.0.4, 12.1.0.2,12.2.0.1 and  18.2. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise Java VM.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3004</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
            <ProductID>P-5V-18.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
            <ProductID>P-5V-18.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="215" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3005</Title>
      <Notes>
         <Note Audience="All" Ordinal="215" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 4.0 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3005</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.0</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="216" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3006</Title>
      <Notes>
         <Note Audience="All" Ordinal="216" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3006</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="217" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3007</Title>
      <Notes>
         <Note Audience="All" Ordinal="217" Title="Details" Type="Details">Vulnerability in the Oracle Tuxedo component of Oracle Fusion Middleware (subcomponent: Core).  Supported versions that are affected are 12.1.1, 12.1.3 and  12.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via Jolt to compromise Oracle Tuxedo.  While the vulnerability is in Oracle Tuxedo, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Tuxedo accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3007</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5433V-12.1.1</ProductID>
            <ProductID>P-5433V-12.1.3</ProductID>
            <ProductID>P-5433V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5433V-12.1.1</ProductID>
            <ProductID>P-5433V-12.1.3</ProductID>
            <ProductID>P-5433V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="218" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3008</Title>
      <Notes>
         <Note Audience="All" Ordinal="218" Title="Details" Type="Details">Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface).  Supported versions that are affected are 12.1.1, 12.1.2 and  12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as  unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3008</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-229V-12.1.1</ProductID>
            <ProductID>P-229V-12.1.2</ProductID>
            <ProductID>P-229V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-229V-12.1.1</ProductID>
            <ProductID>P-229V-12.1.2</ProductID>
            <ProductID>P-229V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="219" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3009</Title>
      <Notes>
         <Note Audience="All" Ordinal="219" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3009</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="220" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3010</Title>
      <Notes>
         <Note Audience="All" Ordinal="220" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3010</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="221" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3012</Title>
      <Notes>
         <Note Audience="All" Ordinal="221" Title="Details" Type="Details">Vulnerability in the Oracle Trade Management component of Oracle E-Business Suite (subcomponent: User Interface).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as  unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3012</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-765V-12.1.1</ProductID>
            <ProductID>P-765V-12.1.2</ProductID>
            <ProductID>P-765V-12.1.3</ProductID>
            <ProductID>P-765V-12.2.3</ProductID>
            <ProductID>P-765V-12.2.4</ProductID>
            <ProductID>P-765V-12.2.5</ProductID>
            <ProductID>P-765V-12.2.6</ProductID>
            <ProductID>P-765V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-765V-12.1.1</ProductID>
            <ProductID>P-765V-12.1.2</ProductID>
            <ProductID>P-765V-12.1.3</ProductID>
            <ProductID>P-765V-12.2.3</ProductID>
            <ProductID>P-765V-12.2.4</ProductID>
            <ProductID>P-765V-12.2.5</ProductID>
            <ProductID>P-765V-12.2.6</ProductID>
            <ProductID>P-765V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="222" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3013</Title>
      <Notes>
         <Note Audience="All" Ordinal="222" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Report Server Config).   The supported version that is affected is 5.5.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3013</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11580V-5.5.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11580V-5.5.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="223" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3014</Title>
      <Notes>
         <Note Audience="All" Ordinal="223" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Reports).   The supported version that is affected is 5.5.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3014</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11580V-5.5.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11580V-5.5.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="224" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3015</Title>
      <Notes>
         <Note Audience="All" Ordinal="224" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3015</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="225" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3016</Title>
      <Notes>
         <Note Audience="All" Ordinal="225" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker).  Supported versions that are affected are 8.55 and  8.56. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3016</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="226" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3017</Title>
      <Notes>
         <Note Audience="All" Ordinal="226" Title="Details" Type="Details">Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Preferences).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as  unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3017</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1199V-12.1.1</ProductID>
            <ProductID>P-1199V-12.1.2</ProductID>
            <ProductID>P-1199V-12.1.3</ProductID>
            <ProductID>P-1199V-12.2.3</ProductID>
            <ProductID>P-1199V-12.2.4</ProductID>
            <ProductID>P-1199V-12.2.5</ProductID>
            <ProductID>P-1199V-12.2.6</ProductID>
            <ProductID>P-1199V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1199V-12.1.1</ProductID>
            <ProductID>P-1199V-12.1.2</ProductID>
            <ProductID>P-1199V-12.1.3</ProductID>
            <ProductID>P-1199V-12.2.3</ProductID>
            <ProductID>P-1199V-12.2.4</ProductID>
            <ProductID>P-1199V-12.2.5</ProductID>
            <ProductID>P-1199V-12.2.6</ProductID>
            <ProductID>P-1199V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="227" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3018</Title>
      <Notes>
         <Note Audience="All" Ordinal="227" Title="Details" Type="Details">Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Shopping Cart).  Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and  12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as  unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3018</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-384V-12.1.1</ProductID>
            <ProductID>P-384V-12.1.2</ProductID>
            <ProductID>P-384V-12.1.3</ProductID>
            <ProductID>P-384V-12.2.3</ProductID>
            <ProductID>P-384V-12.2.4</ProductID>
            <ProductID>P-384V-12.2.5</ProductID>
            <ProductID>P-384V-12.2.6</ProductID>
            <ProductID>P-384V-12.2.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-384V-12.1.1</ProductID>
            <ProductID>P-384V-12.1.2</ProductID>
            <ProductID>P-384V-12.1.3</ProductID>
            <ProductID>P-384V-12.2.3</ProductID>
            <ProductID>P-384V-12.2.4</ProductID>
            <ProductID>P-384V-12.2.5</ProductID>
            <ProductID>P-384V-12.2.6</ProductID>
            <ProductID>P-384V-12.2.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="228" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3019</Title>
      <Notes>
         <Note Audience="All" Ordinal="228" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3019</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9052V-11.3.0</ProductID>
            <ProductID>P-9052V-11.4.0</ProductID>
            <ProductID>P-9052V-12.0.1</ProductID>
            <ProductID>P-9052V-12.0.2</ProductID>
            <ProductID>P-9052V-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
            <ProductID>P-9052V-12.2.0</ProductID>
            <ProductID>P-9052V-12.3.0</ProductID>
            <ProductID>P-9052V-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0</ProductID>
            <ProductID>P-9052V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="229" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3020</Title>
      <Notes>
         <Note Audience="All" Ordinal="229" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data as well as  unauthorized read access to a subset of Oracle Banking Payments accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Payments. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3020</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="230" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3021</Title>
      <Notes>
         <Note Audience="All" Ordinal="230" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Banking Payments accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3021</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="231" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3022</Title>
      <Notes>
         <Note Audience="All" Ordinal="231" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Payments. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3022</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="232" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3023</Title>
      <Notes>
         <Note Audience="All" Ordinal="232" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Payments. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3023</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="233" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3024</Title>
      <Notes>
         <Note Audience="All" Ordinal="233" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data as well as  unauthorized read access to a subset of Oracle Banking Payments accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3024</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="234" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3025</Title>
      <Notes>
         <Note Audience="All" Ordinal="234" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Banking Payments accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3025</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="235" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3026</Title>
      <Notes>
         <Note Audience="All" Ordinal="235" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Payments, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data as well as  unauthorized read access to a subset of Oracle Banking Payments accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3026</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="236" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3027</Title>
      <Notes>
         <Note Audience="All" Ordinal="236" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core).  Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and  14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Banking Payments accessible data as well as  unauthorized access to critical data or complete access to all Oracle Banking Payments accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3027</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13011V-12.2.0</ProductID>
            <ProductID>P-13011V-12.3.0</ProductID>
            <ProductID>P-13011V-12.4.0</ProductID>
            <ProductID>P-13011V-12.5.0</ProductID>
            <ProductID>P-13011V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="237" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3028</Title>
      <Notes>
         <Note Audience="All" Ordinal="237" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Investor Servicing. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3028</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="238" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3029</Title>
      <Notes>
         <Note Audience="All" Ordinal="238" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3029</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="239" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3030</Title>
      <Notes>
         <Note Audience="All" Ordinal="239" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Investor Servicing. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3030</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="240" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3031</Title>
      <Notes>
         <Note Audience="All" Ordinal="240" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Investor Servicing. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="241" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3032</Title>
      <Notes>
         <Note Audience="All" Ordinal="241" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3032</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="242" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3033</Title>
      <Notes>
         <Note Audience="All" Ordinal="242" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="243" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3034</Title>
      <Notes>
         <Note Audience="All" Ordinal="243" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Investor Servicing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3034</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="244" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3035</Title>
      <Notes>
         <Note Audience="All" Ordinal="244" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Investor Servicing accessible data as well as  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3035</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="245" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3036</Title>
      <Notes>
         <Note Audience="All" Ordinal="245" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data as well as  unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Corporate Lending. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3036</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="246" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3037</Title>
      <Notes>
         <Note Audience="All" Ordinal="246" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Enterprise Limits and Collateral Management. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3037</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="247" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3038</Title>
      <Notes>
         <Note Audience="All" Ordinal="247" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3038</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="248" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3039</Title>
      <Notes>
         <Note Audience="All" Ordinal="248" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3039</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="249" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3040</Title>
      <Notes>
         <Note Audience="All" Ordinal="249" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Corporate Lending. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3040</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="250" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3041</Title>
      <Notes>
         <Note Audience="All" Ordinal="250" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Enterprise Limits and Collateral Management. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3041</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="251" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3042</Title>
      <Notes>
         <Note Audience="All" Ordinal="251" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Corporate Lending. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3042</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="252" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3043</Title>
      <Notes>
         <Note Audience="All" Ordinal="252" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Enterprise Limits and Collateral Management. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3043</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="253" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3044</Title>
      <Notes>
         <Note Audience="All" Ordinal="253" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data as well as  unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3044</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="254" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3045</Title>
      <Notes>
         <Note Audience="All" Ordinal="254" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3045</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="255" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3046</Title>
      <Notes>
         <Note Audience="All" Ordinal="255" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3046</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="256" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3047</Title>
      <Notes>
         <Note Audience="All" Ordinal="256" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3047</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="257" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3048</Title>
      <Notes>
         <Note Audience="All" Ordinal="257" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Corporate Lending, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data as well as  unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3048</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="258" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3049</Title>
      <Notes>
         <Note Audience="All" Ordinal="258" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Enterprise Limits and Collateral Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3049</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="259" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3050</Title>
      <Notes>
         <Note Audience="All" Ordinal="259" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module).  Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Banking Corporate Lending accessible data as well as  unauthorized access to critical data or complete access to all Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3050</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12989V-12.3.0</ProductID>
            <ProductID>P-12989V-12.4.0</ProductID>
            <ProductID>P-12989V-12.5.0</ProductID>
            <ProductID>P-12989V-14.0.0</ProductID>
            <ProductID>P-12989V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="260" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3051</Title>
      <Notes>
         <Note Audience="All" Ordinal="260" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure).  Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data as well as  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3051</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9100V-12.3.0</ProductID>
            <ProductID>P-9100V-14.0.0</ProductID>
            <ProductID>P-9100V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="261" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3052</Title>
      <Notes>
         <Note Audience="All" Ordinal="261" Title="Details" Type="Details">Vulnerability in the MICROS Relate CRM Software component of Oracle Retail Applications (subcomponent: Internal Operations).  Supported versions that are affected are 10.8.x and  11.4.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise MICROS Relate CRM Software.  While the vulnerability is in MICROS Relate CRM Software, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MICROS Relate CRM Software accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MICROS Relate CRM Software. CVSS 3.0 Base Score 6.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3052</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11566V-10.8.x</ProductID>
            <ProductID>P-11566V-11.4.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-11566V-10.8.x</ProductID>
            <ProductID>P-11566V-11.4.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="262" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3053</Title>
      <Notes>
         <Note Audience="All" Ordinal="262" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation component of Oracle Retail Applications (subcomponent: Internal Operations).  Supported versions that are affected are 16.x and  17.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  While the vulnerability is in Oracle Retail Customer Management and Segmentation Foundation, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.0 Base Score 6.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3053</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-16.x</ProductID>
            <ProductID>P-13388V-17.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-13388V-16.x</ProductID>
            <ProductID>P-13388V-17.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="263" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3054</Title>
      <Notes>
         <Note Audience="All" Ordinal="263" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL).  Supported versions that are affected are 5.7.22 and prior and  
8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3054</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="264" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3055</Title>
      <Notes>
         <Note Audience="All" Ordinal="264" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and  unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3055</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="265" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3056</Title>
      <Notes>
         <Note Audience="All" Ordinal="265" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges).  Supported versions that are affected are 5.7.22 and prior and  
8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3056</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="266" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3057</Title>
      <Notes>
         <Note Audience="All" Ordinal="266" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks).   The supported version that is affected is Prior to 8.7.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Sun ZFS Storage Appliance Kit (AK) executes to compromise Sun ZFS Storage Appliance Kit (AK).  While the vulnerability is in Sun ZFS Storage Appliance Kit (AK), attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3057</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-10026V-Prior to 8.7.18</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="267" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3058</Title>
      <Notes>
         <Note Audience="All" Ordinal="267" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM).  Supported versions that are affected are 5.5.60 and prior, 
5.6.40 and prior and  
5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3058</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="268" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3060</Title>
      <Notes>
         <Note Audience="All" Ordinal="268" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.7.22 and prior and  
8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3060</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="269" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3061</Title>
      <Notes>
         <Note Audience="All" Ordinal="269" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML).  Supported versions that are affected are 5.7.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3061</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="270" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3062</Title>
      <Notes>
         <Note Audience="All" Ordinal="270" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached).  Supported versions that are affected are 5.6.40 and prior, 
5.7.22 and prior and  
8.0.11 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via memcached to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3062</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="271" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3063</Title>
      <Notes>
         <Note Audience="All" Ordinal="271" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges).  Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3063</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="272" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3064</Title>
      <Notes>
         <Note Audience="All" Ordinal="272" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.6.40 and prior, 
5.7.22 and prior and  
8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3064</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="273" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3065</Title>
      <Notes>
         <Note Audience="All" Ordinal="273" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML).  Supported versions that are affected are 5.7.22 and prior and  
8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3065</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="274" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3066</Title>
      <Notes>
         <Note Audience="All" Ordinal="274" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options).  Supported versions that are affected are 5.5.60 and prior, 
5.6.40 and prior and  
5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data as well as  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3066</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.3</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="275" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3067</Title>
      <Notes>
         <Note Audience="All" Ordinal="275" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3067</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="276" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3068</Title>
      <Notes>
         <Note Audience="All" Ordinal="276" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise HCM Human Resources component of Oracle PeopleSoft Products (subcomponent: Compensation).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Human Resources, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3068</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5071V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5071V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="277" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3069</Title>
      <Notes>
         <Note Audience="All" Ordinal="277" Title="Details" Type="Details">Vulnerability in the Oracle Agile Product Lifecycle Management for Process component of Oracle Supply Chain Products Suite (subcomponent: Installation).   The supported version that is affected is 6.2.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Agile Product Lifecycle Management for Process.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Agile Product Lifecycle Management for Process accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3069</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4445V-6.2.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.7</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-4445V-6.2.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="278" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3070</Title>
      <Notes>
         <Note Audience="All" Ordinal="278" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump).  Supported versions that are affected are 5.5.60 and prior, 
5.6.40 and prior and  
5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3070</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="279" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3071</Title>
      <Notes>
         <Note Audience="All" Ordinal="279" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Audit Log).  Supported versions that are affected are 5.7.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3071</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="280" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3072</Title>
      <Notes>
         <Note Audience="All" Ordinal="280" Title="Details" Type="Details">Vulnerability in the PeopleSoft HRMS component of Oracle PeopleSoft Products (subcomponent: Candidate Gateway).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft HRMS.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of PeopleSoft HRMS accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3072</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5043V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5043V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="281" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3073</Title>
      <Notes>
         <Note Audience="All" Ordinal="281" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3073</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="282" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3074</Title>
      <Notes>
         <Note Audience="All" Ordinal="282" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles).  Supported versions that are affected are 8.0.11 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3074</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="283" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3075</Title>
      <Notes>
         <Note Audience="All" Ordinal="283" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3075</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="284" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3076</Title>
      <Notes>
         <Note Audience="All" Ordinal="284" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise CS Financial Aid component of Oracle PeopleSoft Products (subcomponent: ISIR Processing).  Supported versions that are affected are 9.0 and  9.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CS Financial Aid.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of PeopleSoft Enterprise CS Financial Aid accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3076</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5178V-9.0</ProductID>
            <ProductID>P-5178V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.7</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5178V-9.0</ProductID>
            <ProductID>P-5178V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="285" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3077</Title>
      <Notes>
         <Note Audience="All" Ordinal="285" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL).  Supported versions that are affected are 5.7.22 and prior and  
8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3077</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="286" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3078</Title>
      <Notes>
         <Note Audience="All" Ordinal="286" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3078</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="287" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3079</Title>
      <Notes>
         <Note Audience="All" Ordinal="287" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3079</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="288" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3080</Title>
      <Notes>
         <Note Audience="All" Ordinal="288" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3080</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="289" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3081</Title>
      <Notes>
         <Note Audience="All" Ordinal="289" Title="Details" Type="Details">Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs).  Supported versions that are affected are 5.5.60 and prior, 
5.6.40 and prior, 
5.7.22 and prior and  
8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as  unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3081</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.0</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-5.5.60 and prior</ProductID>
            <ProductID>P-8478V-5.6.40 and prior</ProductID>
            <ProductID>P-8478V-5.7.22 and prior</ProductID>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="290" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3082</Title>
      <Notes>
         <Note Audience="All" Ordinal="290" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3082</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.7</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="291" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3084</Title>
      <Notes>
         <Note Audience="All" Ordinal="291" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Shell: Core / Client).  Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 2.8 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3084</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8478V-8.0.11 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="292" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3085</Title>
      <Notes>
         <Note Audience="All" Ordinal="292" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as  unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3085</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="293" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3086</Title>
      <Notes>
         <Note Audience="All" Ordinal="293" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3086</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="294" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3087</Title>
      <Notes>
         <Note Audience="All" Ordinal="294" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3087</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="295" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3088</Title>
      <Notes>
         <Note Audience="All" Ordinal="295" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3088</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="296" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3089</Title>
      <Notes>
         <Note Audience="All" Ordinal="296" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3089</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="297" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3090</Title>
      <Notes>
         <Note Audience="All" Ordinal="297" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3090</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="298" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3091</Title>
      <Notes>
         <Note Audience="All" Ordinal="298" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).   The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3091</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-8370V-Prior to 5.2.16</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="299" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3092</Title>
      <Notes>
         <Note Audience="All" Ordinal="299" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3092</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="300" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3093</Title>
      <Notes>
         <Note Audience="All" Ordinal="300" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3093</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="301" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3094</Title>
      <Notes>
         <Note Audience="All" Ordinal="301" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3094</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="302" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3095</Title>
      <Notes>
         <Note Audience="All" Ordinal="302" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3095</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="303" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3096</Title>
      <Notes>
         <Note Audience="All" Ordinal="303" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3096</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="304" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3097</Title>
      <Notes>
         <Note Audience="All" Ordinal="304" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3097</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="305" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3098</Title>
      <Notes>
         <Note Audience="All" Ordinal="305" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3098</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="306" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3099</Title>
      <Notes>
         <Note Audience="All" Ordinal="306" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3099</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="307" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3100</Title>
      <Notes>
         <Note Audience="All" Ordinal="307" Title="Details" Type="Details">Vulnerability in the Oracle Business Process Management Suite component of Oracle Fusion Middleware (subcomponent: Process Analysis &amp; Discovery).  Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.2.0 and  12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Process Management Suite.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Business Process Management Suite accessible data as well as  unauthorized access to critical data or complete access to all Oracle Business Process Management Suite accessible data. CVSS 3.0 Base Score 9.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3100</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5325V-11.1.1.7.0</ProductID>
            <ProductID>P-5325V-11.1.1.9.0</ProductID>
            <ProductID>P-5325V-12.1.3.0.0</ProductID>
            <ProductID>P-5325V-12.2.1.2.0</ProductID>
            <ProductID>P-5325V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5325V-11.1.1.7.0</ProductID>
            <ProductID>P-5325V-11.1.1.9.0</ProductID>
            <ProductID>P-5325V-12.1.3.0.0</ProductID>
            <ProductID>P-5325V-12.2.1.2.0</ProductID>
            <ProductID>P-5325V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="308" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3101</Title>
      <Notes>
         <Note Audience="All" Ordinal="308" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Portal component of Oracle Fusion Middleware (subcomponent: Portlet Services).  Supported versions that are affected are 11.1.1.9.0, 12.2.1.2.0 and  12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Portal.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle WebCenter Portal accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3101</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1696V-11.1.1.9.0</ProductID>
            <ProductID>P-1696V-12.2.1.2.0</ProductID>
            <ProductID>P-1696V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1696V-11.1.1.9.0</ProductID>
            <ProductID>P-1696V-12.2.1.2.0</ProductID>
            <ProductID>P-1696V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="309" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3102</Title>
      <Notes>
         <Note Audience="All" Ordinal="309" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3102</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="310" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3103</Title>
      <Notes>
         <Note Audience="All" Ordinal="310" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3103</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="311" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3104</Title>
      <Notes>
         <Note Audience="All" Ordinal="311" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).   The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3104</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-2276V-8.5.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="312" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3105</Title>
      <Notes>
         <Note Audience="All" Ordinal="312" Title="Details" Type="Details">Vulnerability in the Oracle SOA Suite component of Oracle Fusion Middleware (subcomponent: Health Care FastPath).  Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.2.0 and  12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle SOA Suite.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle SOA Suite accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3105</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1162V-11.1.1.7.0</ProductID>
            <ProductID>P-1162V-11.1.1.9.0</ProductID>
            <ProductID>P-1162V-12.1.3.0.0</ProductID>
            <ProductID>P-1162V-12.2.1.2.0</ProductID>
            <ProductID>P-1162V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1162V-11.1.1.7.0</ProductID>
            <ProductID>P-1162V-11.1.1.9.0</ProductID>
            <ProductID>P-1162V-12.1.3.0.0</ProductID>
            <ProductID>P-1162V-12.2.1.2.0</ProductID>
            <ProductID>P-1162V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="313" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3108</Title>
      <Notes>
         <Note Audience="All" Ordinal="313" Title="Details" Type="Details">Vulnerability in the Oracle Fusion Middleware component of Oracle Fusion Middleware (subcomponent: Oracle Notification Service).  Supported versions that are affected are 12.2.1.2 and  12.2.1.3. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Fusion Middleware.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Fusion Middleware accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3108</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1032V-12.2.1.2</ProductID>
            <ProductID>P-1032V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1032V-12.2.1.2</ProductID>
            <ProductID>P-1032V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="314" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3109</Title>
      <Notes>
         <Note Audience="All" Ordinal="314" Title="Details" Type="Details">Vulnerability in the Oracle Fusion Middleware MapViewer component of Oracle Fusion Middleware (subcomponent: Map Builder).  Supported versions that are affected are 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Fusion Middleware MapViewer accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3109</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1215V-12.2.1.2</ProductID>
            <ProductID>P-1215V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1215V-12.2.1.2</ProductID>
            <ProductID>P-1215V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="315" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-7489</Title>
      <Notes>
         <Note Audience="All" Ordinal="315" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for Virtualization component of Oracle Enterprise Manager Products Suite (subcomponent: Plug-In Lifecycle (jackson-databind)).  Supported versions that are affected are 13.2.2 and  13.2.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Virtualization.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager for Virtualization. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-7489</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9586V-13.2.2</ProductID>
            <ProductID>P-9586V-13.2.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-9586V-13.2.2</ProductID>
            <ProductID>P-9586V-13.2.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="316" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-7489</Title>
      <Notes>
         <Note Audience="All" Ordinal="316" Title="Details" Type="Details">Vulnerability in the Oracle Global Lifecycle Management OPatchAuto component of Oracle Global Lifecycle Management (subcomponent: DB specific extensions (jackson-databind)).   The supported version that is affected is All. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Global Lifecycle Management OPatchAuto.  Successful attacks of this vulnerability can result in takeover of Oracle Global Lifecycle Management OPatchAuto. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-7489</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12752V-All</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-12752V-All</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="317" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-7489</Title>
      <Notes>
         <Note Audience="All" Ordinal="317" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Portal component of Oracle Fusion Middleware (subcomponent: Security Framework (jackson-databind)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Portal.  Successful attacks of this vulnerability can result in takeover of Oracle WebCenter Portal. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-7489</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1696V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1696V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="318" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-7489</Title>
      <Notes>
         <Note Audience="All" Ordinal="318" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Console (jackson-databind)).  Supported versions that are affected are 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-7489</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5242V-12.2.1.2</ProductID>
            <ProductID>P-5242V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="319" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-8013</Title>
      <Notes>
         <Note Audience="All" Ordinal="319" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure component of Oracle Financial Services Applications (subcomponent: Link Analysis and Metadata browser (Apache Batik)).  Supported versions that are affected are 7.3.3.x and  8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Analytical Applications Infrastructure accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Financial Services Analytical Applications Infrastructure.  Note: Please refer MOS document (&lt;a href="https://support.oracle.com/rs?type=doc&amp;id=2380553.1"&gt;Doc ID 2380553.1)&lt;/a&gt; for applicability across other Oracle Financial Services products. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-8013</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-7.3.3.x</ProductID>
            <ProductID>P-5680V-8.0.x</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-5680V-7.3.3.x</ProductID>
            <ProductID>P-5680V-8.0.x</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="320" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-8013</Title>
      <Notes>
         <Note Audience="All" Ordinal="320" Title="Details" Type="Details">Vulnerability in the Oracle Fusion Middleware MapViewer component of Oracle Fusion Middleware (subcomponent: Install (Apache Batik)).  Supported versions that are affected are 12.2.1.2 and  12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Fusion Middleware MapViewer accessible data as well as  unauthorized read access to a subset of Oracle Fusion Middleware MapViewer accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Fusion Middleware MapViewer. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-8013</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1215V-12.2.1.2</ProductID>
            <ProductID>P-1215V-12.2.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJul2018</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2018.html</URL>
            <ProductID>P-1215V-12.2.1.2</ProductID>
            <ProductID>P-1215V-12.2.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
</cvrf:cvrfdoc>
