<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="2967710.xsl"?>
<?xml-stylesheet type="text/css" href="2967708.css"?>
<cvrf:cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
   <DocumentTitle xml:lang="en">Oracle Critical Patch Update Advisory - January 2014 - Beta Oracle CVRF</DocumentTitle>
   <DocumentType xml:lang="en">Oracle Critical Patch Update Advisory</DocumentType>
   <DocumentPublisher Type="Vendor"/>
   <DocumentTracking>
      <Identification>
         <ID>CPUJan2014</ID>
      </Identification>
      <Status>Final</Status>
      <Version>1.0</Version>
      <RevisionHistory>
         <Revision>
            <Number>1.0</Number>
            <Date>2014-01-14T13:00:00-07:00</Date>
            <Description>Initial Distribution</Description>
         </Revision>
      </RevisionHistory>
      <InitialReleaseDate>2014-01-14T13:00:00-07:00</InitialReleaseDate>
      <CurrentReleaseDate>2014-01-14T13:00:00-07:00</CurrentReleaseDate>
   </DocumentTracking>
   <DocumentNotes>
      <Note Audience="All" Ordinal="1" Title="Summary" Type="Summary" xml:lang="en">This document contains descriptions of Oracle product security vulnerabilities which have had fixes released for all supported versions and platforms for the associated product.  Additional information regarding these vulnerabilities including fix distribution information can be found at the Oracle sites referenced in this document.</Note>
   </DocumentNotes>
   <DocumentDistribution>This document is published at: http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1932653.xml</DocumentDistribution>
   <DocumentReferences>
      <Reference Type="External">
         <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
         <Description>URL to html version of Advisory</Description>
      </Reference>
   </DocumentReferences>
   <Acknowledgments>
      <Acknowledgment>
         <Name>Abdullah Hussam Gazi</Name>
         <Organization>Abdullah Hussam Gazi</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Adam Willard</Name>
         <Organization>Foreground Security</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Alexander Kornbrust</Name>
         <Organization>Red Database Security</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Alexey Tyurin</Name>
         <Organization>ERPScan (Digital Security Research Group)</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ali Hasan Ghauri</Name>
         <Organization>Ali Hasan Ghauri</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ali Hussein</Name>
         <Organization>Ali Hussein</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Anand Tiwari</Name>
         <Organization>Anand Tiwari</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Arseniy Akuney</Name>
         <Organization>TELUS Security Labs</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ben Khlifa Fahmi</Name>
         <Organization>Ben Khlifa Fahmi</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Cam Beasley</Name>
         <Organization>Information Security Office for the Univ. of Texas at Austin</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Carlo Di Dato</Name>
         <Organization>iDefense</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Christopher Meyer</Name>
         <Organization>Ruhr-University Bochum</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Daniel EkBerg</Name>
         <Organization>Kentor AB Sweden</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dibyendu Sikdar</Name>
         <Organization>Dibyendu Sikdar</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Esteban Martinez Fayo</Name>
         <Organization>Application Security, Inc.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Fernando Muñoz</Name>
         <Organization>Fernando Muñoz</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Griffin Francis</Name>
         <Organization>Griffin Francis</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>James Pearson</Name>
         <Organization>James Pearson</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jeffrey</Name>
         <Organization>Apple</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>John Leitch</Name>
         <Organization>HP DVLabs</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Johnathan Simon</Name>
         <Organization>Johnathan Simon</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Joseph Sheridan</Name>
         <Organization>Reactionis</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Juraj Somorovsky</Name>
         <Organization>Ruhr-University Bochum</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Kevin Stadmeyer for Maarten Van Horenbeeck</Name>
         <Organization>Google</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Koutrouss Naddara</Name>
         <Organization>Kotros Nadara</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Matthew Daley</Name>
         <Organization>Matthew Daley</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Moez Roy</Name>
         <Organization>Moez Roy</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Mohammed Osman</Name>
         <Organization>Mohammed Osman</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Muhammad Talha Khan</Name>
         <Organization>Muhammad Talha Khan</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Oliver Gruskovnjak</Name>
         <Organization>Portcullis Inc</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Osanda Malith Jayathissa</Name>
         <Organization>Osanda Malith Jayathissa</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Owais Mohammad Khan</Name>
         <Organization>Owais Mohammad Khan</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Peter Jaric</Name>
         <Organization>Peter Jaric</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Rafay Baloch</Name>
         <Organization>Rafay Baloch</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Rakesh Singh</Name>
         <Organization>Zero Day Guys</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sam Thomas</Name>
         <Organization>Pentest Limited</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sebastian Schinzel</Name>
         <Organization>University of Applied Sciences Münster</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sky_BlaCk</Name>
         <Organization>Sky_BlaCk</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sunil Dadhich</Name>
         <Organization>Sunil Dadhich</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Suraj Radhakrishnan</Name>
         <Organization>Suraj Radhakrishnan</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Tanel Poder</Name>
         <Organization>Tanel Poder</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Tor Erling Bjorstad</Name>
         <Organization>Tor Erling Bjorstad</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Vishnu Patel</Name>
         <Organization>Vishnu Patel</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Will Dormann</Name>
         <Organization>CERT/CC</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Yash Kadakia</Name>
         <Organization>Security Brigade</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Yuki Chen</Name>
         <Organization>Trend Micro</Organization>
      </Acknowledgment>
   </Acknowledgments>
   <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
      <Branch Name="Oracle" Type="Vendor">
         <Branch Name="Oracle Database Server" Type="Product Family">
            <Branch Name="Oracle Database" Type="Product Name">
               <Branch Name="11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-5V-11.1.0.7">Oracle Database Version 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="11.2.0.3" Type="Product Version">
                  <FullProductName ProductID="P-5V-11.2.0.3">Oracle Database Version 11.2.0.3</FullProductName>
               </Branch>
               <Branch Name="11.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-5V-11.2.0.4">Oracle Database Version 11.2.0.4</FullProductName>
               </Branch>
               <Branch Name="12.1.0.1" Type="Product Version">
                  <FullProductName ProductID="P-5V-12.1.0.1">Oracle Database Version 12.1.0.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Spatial and Graph" Type="Product Name">
               <Branch Name="11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-619V-11.1.0.7">Spatial and Graph Version 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="11.2.0.3" Type="Product Version">
                  <FullProductName ProductID="P-619V-11.2.0.3">Spatial and Graph Version 11.2.0.3</FullProductName>
               </Branch>
               <Branch Name="11.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-619V-11.2.0.4">Spatial and Graph Version 11.2.0.4</FullProductName>
               </Branch>
               <Branch Name="12.1.0.1" Type="Product Version">
                  <FullProductName ProductID="P-619V-12.1.0.1">Spatial and Graph Version 12.1.0.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle E-Business Suite" Type="Product Family">
            <Branch Name="Payroll" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-506V-11.5.10.2">Payroll Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.0.6">Payroll Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.1.1">Payroll Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.1.2">Payroll Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.1.3">Payroll Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.2" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.2.2">Payroll Version 12.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Application Object Library" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-510V-11.5.10.2">Application Object Library Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.0.6">Application Object Library Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.1.3">Application Object Library Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.2" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.2.2">Application Object Library Version 12.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Applications Framework" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-1472V-11.5.10.2">Applications Framework Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-1472V-12.0.6">Applications Framework Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1472V-12.1.3">Applications Framework Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.2" Type="Product Version">
                  <FullProductName ProductID="P-1472V-12.2.2">Applications Framework Version 12.2.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Financial Services Software" Type="Product Family">
            <Branch Name="FLEXCUBE Private Banking" Type="Product Name">
               <Branch Name="1.7" Type="Product Version">
                  <FullProductName ProductID="P-9110V-1.7">FLEXCUBE Private Banking Version 1.7</FullProductName>
               </Branch>
               <Branch Name="12.0.1" Type="Product Version">
                  <FullProductName ProductID="P-9110V-12.0.1">FLEXCUBE Private Banking Version 12.0.1</FullProductName>
               </Branch>
               <Branch Name="12.0.2" Type="Product Version">
                  <FullProductName ProductID="P-9110V-12.0.2">FLEXCUBE Private Banking Version 12.0.2</FullProductName>
               </Branch>
               <Branch Name="2.0" Type="Product Version">
                  <FullProductName ProductID="P-9110V-2.0">FLEXCUBE Private Banking Version 2.0</FullProductName>
               </Branch>
               <Branch Name="2.0.1" Type="Product Version">
                  <FullProductName ProductID="P-9110V-2.0.1">FLEXCUBE Private Banking Version 2.0.1</FullProductName>
               </Branch>
               <Branch Name="2.2.0.1" Type="Product Version">
                  <FullProductName ProductID="P-9110V-2.2.0.1">FLEXCUBE Private Banking Version 2.2.0.1</FullProductName>
               </Branch>
               <Branch Name="3.0" Type="Product Version">
                  <FullProductName ProductID="P-9110V-3.0">FLEXCUBE Private Banking Version 3.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Fusion Middleware" Type="Product Family">
            <Branch Name="Portal" Type="Product Name">
               <Branch Name="11.1.1.6" Type="Product Version">
                  <FullProductName ProductID="P-96V-11.1.1.6">Portal Version 11.1.1.6</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Reports Developer" Type="Product Name">
               <Branch Name="11.1.1.6" Type="Product Version">
                  <FullProductName ProductID="P-159V-11.1.1.6">Reports Developer Version 11.1.1.6</FullProductName>
               </Branch>
               <Branch Name="11.1.1.7" Type="Product Version">
                  <FullProductName ProductID="P-159V-11.1.1.7">Reports Developer Version 11.1.1.7</FullProductName>
               </Branch>
               <Branch Name="11.1.2.1" Type="Product Version">
                  <FullProductName ProductID="P-159V-11.1.2.1">Reports Developer Version 11.1.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Internet Directory" Type="Product Name">
               <Branch Name="11.1.1.6" Type="Product Version">
                  <FullProductName ProductID="P-355V-11.1.1.6">Internet Directory Version 11.1.1.6</FullProductName>
               </Branch>
               <Branch Name="11.1.1.7" Type="Product Version">
                  <FullProductName ProductID="P-355V-11.1.1.7">Internet Directory Version 11.1.1.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="HTTP Server" Type="Product Name">
               <Branch Name="11.1.1.7.0" Type="Product Version">
                  <FullProductName ProductID="P-1042V-11.1.1.7.0">HTTP Server Version 11.1.1.7.0</FullProductName>
               </Branch>
               <Branch Name="11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1" Type="Product Version">
                  <FullProductName ProductID="P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1">HTTP Server Version 11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</FullProductName>
               </Branch>
               <Branch Name="11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1 Fusion Middleware: 10.1.3.5.0" Type="Product Version">
                  <FullProductName ProductID="P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1 Fusion Middleware: 10.1.3.5.0">HTTP Server Version 11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1 Fusion Middleware: 10.1.3.5.0</FullProductName>
               </Branch>
               <Branch Name="12.1.2.0 Oracle Forms and Reports: 11.1.2.1" Type="Product Version">
                  <FullProductName ProductID="P-1042V-12.1.2.0 Oracle Forms and Reports: 11.1.2.1">HTTP Server Version 12.1.2.0 Oracle Forms and Reports: 11.1.2.1</FullProductName>
               </Branch>
               <Branch Name="OHS: 11.1.1.6.0" Type="Product Version">
                  <FullProductName ProductID="P-1042V-OHS: 11.1.1.6.0">HTTP Server Version OHS: 11.1.1.6.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="WebCenter Portal" Type="Product Name">
               <Branch Name="11.1.1.6.0" Type="Product Version">
                  <FullProductName ProductID="P-1696V-11.1.1.6.0">WebCenter Portal Version 11.1.1.6.0</FullProductName>
               </Branch>
               <Branch Name="11.1.1.7.0" Type="Product Version">
                  <FullProductName ProductID="P-1696V-11.1.1.7.0">WebCenter Portal Version 11.1.1.7.0</FullProductName>
               </Branch>
               <Branch Name="11.1.1.8.0" Type="Product Version">
                  <FullProductName ProductID="P-1696V-11.1.1.8.0">WebCenter Portal Version 11.1.1.8.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Identity Manager" Type="Product Name">
               <Branch Name="11.1.1.5" Type="Product Version">
                  <FullProductName ProductID="P-1980V-11.1.1.5">Identity Manager Version 11.1.1.5</FullProductName>
               </Branch>
               <Branch Name="11.1.1.7" Type="Product Version">
                  <FullProductName ProductID="P-1980V-11.1.1.7">Identity Manager Version 11.1.1.7</FullProductName>
               </Branch>
               <Branch Name="11.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-1980V-11.1.2.0">Identity Manager Version 11.1.2.0</FullProductName>
               </Branch>
               <Branch Name="11.1.2.1" Type="Product Version">
                  <FullProductName ProductID="P-1980V-11.1.2.1">Identity Manager Version 11.1.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Outside In Technology" Type="Product Name">
               <Branch Name="8.4.0" Type="Product Version">
                  <FullProductName ProductID="P-2276V-8.4.0">Outside In Technology Version 8.4.0</FullProductName>
               </Branch>
               <Branch Name="8.4.1" Type="Product Version">
                  <FullProductName ProductID="P-2276V-8.4.1">Outside In Technology Version 8.4.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="GlassFish Server" Type="Product Name">
               <Branch Name="8.2" Type="Product Version">
                  <FullProductName ProductID="P-8493V-8.2">GlassFish Server Version 8.2</FullProductName>
               </Branch>
               <Branch Name="GlassFish Enterprise Server 2.1.1" Type="Product Version">
                  <FullProductName ProductID="P-8493V-GlassFish Enterprise Server 2.1.1">GlassFish Server Version GlassFish Enterprise Server 2.1.1</FullProductName>
               </Branch>
               <Branch Name="Sun Java Application Server 8.1" Type="Product Version">
                  <FullProductName ProductID="P-8493V-Sun Java Application Server 8.1">GlassFish Server Version Sun Java Application Server 8.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="iPlanet Web Proxy Server" Type="Product Name">
               <Branch Name="4.0" Type="Product Version">
                  <FullProductName ProductID="P-8542V-4.0">iPlanet Web Proxy Server Version 4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="iPlanet Web Server" Type="Product Name">
               <Branch Name="6.1" Type="Product Version">
                  <FullProductName ProductID="P-8543V-6.1">iPlanet Web Server Version 6.1</FullProductName>
               </Branch>
               <Branch Name="7.0" Type="Product Version">
                  <FullProductName ProductID="P-8543V-7.0">iPlanet Web Server Version 7.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Traffic Director" Type="Product Name">
               <Branch Name="11.1.1.6" Type="Product Version">
                  <FullProductName ProductID="P-9276V-11.1.1.6">Traffic Director Version 11.1.1.6</FullProductName>
               </Branch>
               <Branch Name="11.1.1.7" Type="Product Version">
                  <FullProductName ProductID="P-9276V-11.1.1.7">Traffic Director Version 11.1.1.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Data Quality" Type="Product Name">
               <Branch Name="8.1" Type="Product Version">
                  <FullProductName ProductID="P-9464V-8.1">Enterprise Data Quality Version 8.1</FullProductName>
               </Branch>
               <Branch Name="9.0.8" Type="Product Version">
                  <FullProductName ProductID="P-9464V-9.0.8">Enterprise Data Quality Version 9.0.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="WebCenter Sites" Type="Product Name">
               <Branch Name="11.1.1.6.1" Type="Product Version">
                  <FullProductName ProductID="P-9617V-11.1.1.6.1">WebCenter Sites Version 11.1.1.6.1</FullProductName>
               </Branch>
               <Branch Name="11.1.1.8.0" Type="Product Version">
                  <FullProductName ProductID="P-9617V-11.1.1.8.0">WebCenter Sites Version 11.1.1.8.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Hyperion" Type="Product Family">
            <Branch Name="Hyperion Essbase Administration Services" Type="Product Name">
               <Branch Name="11.1.2.1" Type="Product Version">
                  <FullProductName ProductID="P-4380V-11.1.2.1">Hyperion Essbase Administration Services Version 11.1.2.1</FullProductName>
               </Branch>
               <Branch Name="11.1.2.2" Type="Product Version">
                  <FullProductName ProductID="P-4380V-11.1.2.2">Hyperion Essbase Administration Services Version 11.1.2.2</FullProductName>
               </Branch>
               <Branch Name="11.1.2.3" Type="Product Version">
                  <FullProductName ProductID="P-4380V-11.1.2.3">Hyperion Essbase Administration Services Version 11.1.2.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Hyperion Strategic Finance" Type="Product Name">
               <Branch Name="11.1.2.1" Type="Product Version">
                  <FullProductName ProductID="P-4408V-11.1.2.1">Hyperion Strategic Finance Version 11.1.2.1</FullProductName>
               </Branch>
               <Branch Name="11.1.2.2" Type="Product Version">
                  <FullProductName ProductID="P-4408V-11.1.2.2">Hyperion Strategic Finance Version 11.1.2.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Java SE" Type="Product Family">
            <Branch Name="Java" Type="Product Name">
               <Branch Name="JRockit R27.7.7" Type="Product Version">
                  <FullProductName ProductID="P-856V-JRockit R27.7.7">Java Version JRockit R27.7.7</FullProductName>
               </Branch>
               <Branch Name="JRockit R28.2.9" Type="Product Version">
                  <FullProductName ProductID="P-856V-JRockit R28.2.9">Java Version JRockit R28.2.9</FullProductName>
               </Branch>
               <Branch Name="Java SE 5.0u55" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE 5.0u55">Java Version Java SE 5.0u55</FullProductName>
               </Branch>
               <Branch Name="Java SE 6u65" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE 6u65">Java Version Java SE 6u65</FullProductName>
               </Branch>
               <Branch Name="Java SE 7u45" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE 7u45">Java Version Java SE 7u45</FullProductName>
               </Branch>
               <Branch Name="Java SE 7u45 on Firefox" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE 7u45 on Firefox">Java Version Java SE 7u45 on Firefox</FullProductName>
               </Branch>
               <Branch Name="Java SE 7u45 on OS X" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE 7u45 on OS X">Java Version Java SE 7u45 on OS X</FullProductName>
               </Branch>
               <Branch Name="Java SE Embedded 7u45" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE Embedded 7u45">Java Version Java SE Embedded 7u45</FullProductName>
               </Branch>
               <Branch Name="JavaFX 2.2.45" Type="Product Version">
                  <FullProductName ProductID="P-856V-JavaFX 2.2.45">Java Version JavaFX 2.2.45</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle MySQL" Type="Product Family">
            <Branch Name="MySQL Server" Type="Product Name">
               <Branch Name="5.1.71 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.1.71 and earlier">MySQL Server Version 5.1.71 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.1.72 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.1.72 and earlier">MySQL Server Version 5.1.72 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.5.33 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.5.33 and earlier">MySQL Server Version 5.5.33 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.5.34 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.5.34 and earlier">MySQL Server Version 5.5.34 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.6.13 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.6.13 and earlier">MySQL Server Version 5.6.13 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.6.14 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.6.14 and earlier">MySQL Server Version 5.6.14 and earlier</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Enterprise Monitor" Type="Product Name">
               <Branch Name="2.3.14 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8480V-2.3.14 and earlier">MySQL Enterprise Monitor Version 2.3.14 and earlier</FullProductName>
               </Branch>
               <Branch Name="3.0.4 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8480V-3.0.4 and earlier">MySQL Enterprise Monitor Version 3.0.4 and earlier</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle PeopleSoft Products" Type="Product Family">
            <Branch Name="PeopleSoft Enterprise HRMS eProfile Manager Desktop" Type="Product Name">
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-5052V-9.1">PeopleSoft Enterprise HRMS eProfile Manager Desktop Version 9.1</FullProductName>
               </Branch>
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-5052V-9.2">PeopleSoft Enterprise HRMS eProfile Manager Desktop Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise HRMS Human Resources" Type="Product Name">
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-5071V-9.1">PeopleSoft Enterprise HRMS Human Resources Version 9.1</FullProductName>
               </Branch>
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-5071V-9.2">PeopleSoft Enterprise HRMS Human Resources Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise PT PeopleTools" Type="Product Name">
               <Branch Name="8.52" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.52">PeopleSoft Enterprise PT PeopleTools Version 8.52</FullProductName>
               </Branch>
               <Branch Name="8.53" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.53">PeopleSoft Enterprise PT PeopleTools Version 8.53</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise SCM Services Procurement" Type="Product Name">
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-5135V-9.2">PeopleSoft Enterprise SCM Services Procurement Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise CC Common Application Objects" Type="Product Name">
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-8911V-9.1">PeopleSoft Enterprise CC Common Application Objects Version 9.1</FullProductName>
               </Branch>
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-8911V-9.2">PeopleSoft Enterprise CC Common Application Objects Version 9.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Siebel CRM" Type="Product Family">
            <Branch Name="Siebel Core - EAI" Type="Product Name">
               <Branch Name="8.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9021V-8.1.1">Siebel Core - EAI Version 8.1.1</FullProductName>
               </Branch>
               <Branch Name="8.2.2" Type="Product Version">
                  <FullProductName ProductID="P-9021V-8.2.2">Siebel Core - EAI Version 8.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Siebel Life Sciences" Type="Product Name">
               <Branch Name="8.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9173V-8.1.1">Siebel Life Sciences Version 8.1.1</FullProductName>
               </Branch>
               <Branch Name="8.2.2" Type="Product Version">
                  <FullProductName ProductID="P-9173V-8.2.2">Siebel Life Sciences Version 8.2.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Supply Chain Products Suite" Type="Product Family">
            <Branch Name="Transportation Management" Type="Product Name">
               <Branch Name="6.0" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.0">Transportation Management Version 6.0</FullProductName>
               </Branch>
               <Branch Name="6.1" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.1">Transportation Management Version 6.1</FullProductName>
               </Branch>
               <Branch Name="6.2" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.2">Transportation Management Version 6.2</FullProductName>
               </Branch>
               <Branch Name="6.3" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.3">Transportation Management Version 6.3</FullProductName>
               </Branch>
               <Branch Name="6.3.1" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.3.1">Transportation Management Version 6.3.1</FullProductName>
               </Branch>
               <Branch Name="6.3.2" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.3.2">Transportation Management Version 6.3.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Demantra Demand Management" Type="Product Name">
               <Branch Name="12.2.0" Type="Product Version">
                  <FullProductName ProductID="P-2100V-12.2.0">Demantra Demand Management Version 12.2.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1" Type="Product Version">
                  <FullProductName ProductID="P-2100V-12.2.1">Demantra Demand Management Version 12.2.1</FullProductName>
               </Branch>
               <Branch Name="12.2.2" Type="Product Version">
                  <FullProductName ProductID="P-2100V-12.2.2">Demantra Demand Management Version 12.2.2</FullProductName>
               </Branch>
               <Branch Name="12.2.3" Type="Product Version">
                  <FullProductName ProductID="P-2100V-12.2.3">Demantra Demand Management Version 12.2.3</FullProductName>
               </Branch>
               <Branch Name="7.2.0.3 SQL-Server" Type="Product Version">
                  <FullProductName ProductID="P-2100V-7.2.0.3 SQL-Server">Demantra Demand Management Version 7.2.0.3 SQL-Server</FullProductName>
               </Branch>
               <Branch Name="7.3.0" Type="Product Version">
                  <FullProductName ProductID="P-2100V-7.3.0">Demantra Demand Management Version 7.3.0</FullProductName>
               </Branch>
               <Branch Name="7.3.0.x" Type="Product Version">
                  <FullProductName ProductID="P-2100V-7.3.0.x">Demantra Demand Management Version 7.3.0.x</FullProductName>
               </Branch>
               <Branch Name="7.3.1" Type="Product Version">
                  <FullProductName ProductID="P-2100V-7.3.1">Demantra Demand Management Version 7.3.1</FullProductName>
               </Branch>
               <Branch Name="7.3.1.x" Type="Product Version">
                  <FullProductName ProductID="P-2100V-7.3.1.x">Demantra Demand Management Version 7.3.1.x</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Agile Product Lifecycle Management for Process" Type="Product Name">
               <Branch Name="6.0" Type="Product Version">
                  <FullProductName ProductID="P-4445V-6.0">Agile Product Lifecycle Management for Process Version 6.0</FullProductName>
               </Branch>
               <Branch Name="6.1" Type="Product Version">
                  <FullProductName ProductID="P-4445V-6.1">Agile Product Lifecycle Management for Process Version 6.1</FullProductName>
               </Branch>
               <Branch Name="6.1.1" Type="Product Version">
                  <FullProductName ProductID="P-4445V-6.1.1">Agile Product Lifecycle Management for Process Version 6.1.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="AutoVue Electro-Mechanical Professional" Type="Product Name">
               <Branch Name="20.1.1" Type="Product Version">
                  <FullProductName ProductID="P-4453V-20.1.1">AutoVue Electro-Mechanical Professional Version 20.1.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Virtualization" Type="Product Family">
            <Branch Name="Oracle VM VirtualBox" Type="Product Name">
               <Branch Name="4.0.22" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.0.22">Oracle VM VirtualBox Version 4.0.22</FullProductName>
               </Branch>
               <Branch Name="4.1.30" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.1.30">Oracle VM VirtualBox Version 4.1.30</FullProductName>
               </Branch>
               <Branch Name="4.2.20" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.2.20">Oracle VM VirtualBox Version 4.2.20</FullProductName>
               </Branch>
               <Branch Name="4.2.22" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.2.22">Oracle VM VirtualBox Version 4.2.22</FullProductName>
               </Branch>
               <Branch Name="4.3.4" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.3.4">Oracle VM VirtualBox Version 4.3.4</FullProductName>
               </Branch>
               <Branch Name="4.3.6" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.3.6">Oracle VM VirtualBox Version 4.3.6</FullProductName>
               </Branch>
               <Branch Name="VirtualBox prior to 3.2.20" Type="Product Version">
                  <FullProductName ProductID="P-8370V-VirtualBox prior to 3.2.20">Oracle VM VirtualBox Version VirtualBox prior to 3.2.20</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Secure Global Desktop" Type="Product Name">
               <Branch Name="4.71" Type="Product Version">
                  <FullProductName ProductID="P-8539V-4.71">Secure Global Desktop Version 4.71</FullProductName>
               </Branch>
               <Branch Name="5.0 with December 2013 PSU" Type="Product Version">
                  <FullProductName ProductID="P-8539V-5.0 with December 2013 PSU">Secure Global Desktop Version 5.0 with December 2013 PSU</FullProductName>
               </Branch>
               <Branch Name="5.10" Type="Product Version">
                  <FullProductName ProductID="P-8539V-5.10">Secure Global Desktop Version 5.10</FullProductName>
               </Branch>
               <Branch Name="SGD prior to 4.63 with December 2013 PSU" Type="Product Version">
                  <FullProductName ProductID="P-8539V-SGD prior to 4.63 with December 2013 PSU">Secure Global Desktop Version SGD prior to 4.63 with December 2013 PSU</FullProductName>
               </Branch>
               <Branch Name="SGD prior to 4.71 with December 2013 PSU" Type="Product Version">
                  <FullProductName ProductID="P-8539V-SGD prior to 4.71 with December 2013 PSU">Secure Global Desktop Version SGD prior to 4.71 with December 2013 PSU</FullProductName>
               </Branch>
               <Branch Name="SGD prior to SGD 4.63 with December 2013 PSU" Type="Product Version">
                  <FullProductName ProductID="P-8539V-SGD prior to SGD 4.63 with December 2013 PSU">Secure Global Desktop Version SGD prior to SGD 4.63 with December 2013 PSU</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle and Sun Systems Products Suite" Type="Product Family">
            <Branch Name="Solaris Operating System" Type="Product Name">
               <Branch Name="10" Type="Product Version">
                  <FullProductName ProductID="P-10006V-10">Solaris Operating System Version 10</FullProductName>
               </Branch>
               <Branch Name="11.1" Type="Product Version">
                  <FullProductName ProductID="P-10006V-11.1">Solaris Operating System Version 11.1</FullProductName>
               </Branch>
               <Branch Name="8" Type="Product Version">
                  <FullProductName ProductID="P-10006V-8">Solaris Operating System Version 8</FullProductName>
               </Branch>
               <Branch Name="9" Type="Product Version">
                  <FullProductName ProductID="P-10006V-9">Solaris Operating System Version 9</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle iLearning" Type="Product Family">
            <Branch Name="iLearning" Type="Product Name">
               <Branch Name="6.0" Type="Product Version">
                  <FullProductName ProductID="P-902V-6.0">iLearning Version 6.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
      </Branch>
   </ProductTree>
   <Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2003-1067</Title>
      <Notes>
         <Note Audience="All" Ordinal="1" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)).  Supported versions that are affected are 8 and  9. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies only when Solaris is running on SPARC platform. CVSS Base Score 7.2 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2003-1067</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-8</ProductID>
            <ProductID>P-10006V-9</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.2</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-8</ProductID>
            <ProductID>P-10006V-9</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2007-0009</Title>
      <Notes>
         <Note Audience="All" Ordinal="2" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: OSSL Module).  Supported versions that are affected are OHS: 11.1.1.6.0 and  11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTPS.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle HTTP Server accessible data as well as  read access to a subset of Oracle HTTP Server accessible data and ability to cause a partial denial of service (partial DOS) of Oracle HTTP Server.   Note: This fix also addresses CVE-2007-0008. CVSS Base Score 6.8 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2007-0009</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2007-1858</Title>
      <Notes>
         <Note Audience="All" Ordinal="3" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: OSSL Module).  Supported versions that are affected are OHS: 11.1.1.6.0 and  11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTPS.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle HTTP Server accessible data.  CVSS Base Score 2.6 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2007-1858</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.6</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3499</Title>
      <Notes>
         <Note Audience="All" Ordinal="4" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: Web Listener).  Supported versions that are affected are OHS: 11.1.1.6.0 and  11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle HTTP Server accessible data.   Note: This fix also addresses CVE-2012-4558. CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3499</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3544</Title>
      <Notes>
         <Note Audience="All" Ordinal="5" Title="Details" Type="Details">Vulnerability in the Oracle Transportation Management component of Oracle Supply Chain Products Suite (subcomponent: Application Server).  Supported versions that are affected are 6.0, 6.1, 6.2, 6.3, 6.3.1 and  6.3.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Transportation Management.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3544</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1991V-6.0</ProductID>
            <ProductID>P-1991V-6.1</ProductID>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1991V-6.0</ProductID>
            <ProductID>P-1991V-6.1</ProductID>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3544</Title>
      <Notes>
         <Note Audience="All" Ordinal="6" Title="Details" Type="Details">Vulnerability in the Oracle Secure Global Desktop (SGD) component of Oracle Virtualization (subcomponent: Apache Tomcat).  Supported versions that are affected are SGD prior to 4.63 with December 2013 PSU and  4.71. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Secure Global Desktop (SGD).  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3544</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8539V-SGD prior to 4.63 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-4.71</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8539V-SGD prior to 4.63 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-4.71</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3544</Title>
      <Notes>
         <Note Audience="All" Ordinal="7" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Data Quality component of Oracle Fusion Middleware (subcomponent: Internal Operations).  Supported versions that are affected are 8.1 and  9.0.8. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Enterprise Data Quality.   Note: Please refer to Doc ID &lt;A HREF="http://support.oracle.com/CSP/main/article?cmd=show&amp;type=NOT&amp;id=1595538.1"&gt;My Oracle Support Note 1595538.1&lt;/a&gt; for instructions on how to address this issue. CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3544</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9464V-8.1</ProductID>
            <ProductID>P-9464V-9.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-9464V-8.1</ProductID>
            <ProductID>P-9464V-9.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-4605</Title>
      <Notes>
         <Note Audience="All" Ordinal="8" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: OSSL Module).  Supported versions that are affected are OHS: 11.1.1.6.0 and  11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTPS.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle HTTP Server accessible data.   Note: This fix also addresses CVE-2006-0998 and CVE-2006-0999. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-4605</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-1620</Title>
      <Notes>
         <Note Audience="All" Ordinal="9" Title="Details" Type="Details">Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security).  Supported versions that are affected are GlassFish Enterprise Server 2.1.1, Sun Java Application Server 8.1 and  8.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTPS.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle GlassFish Server accessible data.  CVSS Base Score 4.3 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-1620</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8493V-GlassFish Enterprise Server 2.1.1</ProductID>
            <ProductID>P-8493V-Sun Java Application Server 8.1</ProductID>
            <ProductID>P-8493V-8.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8493V-GlassFish Enterprise Server 2.1.1</ProductID>
            <ProductID>P-8493V-Sun Java Application Server 8.1</ProductID>
            <ProductID>P-8493V-8.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-1620</Title>
      <Notes>
         <Note Audience="All" Ordinal="10" Title="Details" Type="Details">Vulnerability in the Oracle iPlanet Web Proxy Server component of Oracle Fusion Middleware (subcomponent: Security).   The supported version that is affected is 4.0. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTPS.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle iPlanet Web Proxy Server accessible data.  CVSS Base Score 4.3 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-1620</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8542V-4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8542V-4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-1620</Title>
      <Notes>
         <Note Audience="All" Ordinal="11" Title="Details" Type="Details">Vulnerability in the Oracle iPlanet Web Server component of Oracle Fusion Middleware (subcomponent: Security).  Supported versions that are affected are 6.1 and  7.0. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTPS.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle iPlanet Web Server accessible data.  CVSS Base Score 4.3 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-1620</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8543V-6.1</ProductID>
            <ProductID>P-8543V-7.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8543V-6.1</ProductID>
            <ProductID>P-8543V-7.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-1620</Title>
      <Notes>
         <Note Audience="All" Ordinal="12" Title="Details" Type="Details">Vulnerability in the Oracle Traffic Director component of Oracle Fusion Middleware (subcomponent: Security).  Supported versions that are affected are 11.1.1.6 and  11.1.1.7. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTPS.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Traffic Director accessible data.  CVSS Base Score 4.3 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-1620</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9276V-11.1.1.6</ProductID>
            <ProductID>P-9276V-11.1.1.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-9276V-11.1.1.6</ProductID>
            <ProductID>P-9276V-11.1.1.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-1654</Title>
      <Notes>
         <Note Audience="All" Ordinal="13" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: OSSL Module).  Supported versions that are affected are OHS: 11.1.1.6.0 and  11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1 Fusion Middleware: 10.1.3.5.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTPS.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle HTTP Server accessible data.  CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-1654</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1 Fusion Middleware: 10.1.3.5.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0 Oracle Forms and Reports: 11.1.2.1 Fusion Middleware: 10.1.3.5.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="14" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-1862</Title>
      <Notes>
         <Note Audience="All" Ordinal="14" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server component of Oracle Fusion Middleware (subcomponent: Web Listener).  Supported versions that are affected are OHS: 11.1.1.6.0, 11.1.1.7.0 and  12.1.2.0  Oracle Forms and Reports: 11.1.2.1. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle HTTP Server accessible data as well as  read access to a subset of Oracle HTTP Server accessible data and ability to cause a partial denial of service (partial DOS) of Oracle HTTP Server.  CVSS Base Score 5.1 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-1862</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0</ProductID>
            <ProductID>P-1042V-12.1.2.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.1</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1042V-OHS: 11.1.1.6.0</ProductID>
            <ProductID>P-1042V-11.1.1.7.0</ProductID>
            <ProductID>P-1042V-12.1.2.0 Oracle Forms and Reports: 11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="15" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2067</Title>
      <Notes>
         <Note Audience="All" Ordinal="15" Title="Details" Type="Details">Vulnerability in the Oracle Transportation Management component of Oracle Supply Chain Products Suite (subcomponent: Application Server).  Supported versions that are affected are 6.0, 6.1, 6.2, 6.3, 6.3.1 and  6.3.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to all Oracle Transportation Management accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P+/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2067</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1991V-6.0</ProductID>
            <ProductID>P-1991V-6.1</ProductID>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1991V-6.0</ProductID>
            <ProductID>P-1991V-6.1</ProductID>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="16" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2067</Title>
      <Notes>
         <Note Audience="All" Ordinal="16" Title="Details" Type="Details">Vulnerability in the Oracle Secure Global Desktop (SGD) component of Oracle Virtualization (subcomponent: Apache Tomcat).  Supported versions that are affected are SGD prior to SGD 4.63 with December 2013 PSU  and  4.71. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Secure Global Desktop (SGD) accessible data as well as  read access to a subset of Oracle Secure Global Desktop (SGD) accessible data and ability to cause a partial denial of service (partial DOS) of Oracle Secure Global Desktop (SGD).  CVSS Base Score 6.8 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2067</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8539V-SGD prior to SGD 4.63 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-4.71</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8539V-SGD prior to SGD 4.63 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-4.71</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="17" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2071</Title>
      <Notes>
         <Note Audience="All" Ordinal="17" Title="Details" Type="Details">Vulnerability in the Oracle Transportation Management component of Oracle Supply Chain Products Suite (subcomponent: Application Server).  Supported versions that are affected are 6.0, 6.1, 6.2, 6.3, 6.3.1 and  6.3.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Transportation Management accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2071</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1991V-6.0</ProductID>
            <ProductID>P-1991V-6.1</ProductID>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1991V-6.0</ProductID>
            <ProductID>P-1991V-6.1</ProductID>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="18" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2071</Title>
      <Notes>
         <Note Audience="All" Ordinal="18" Title="Details" Type="Details">Vulnerability in the Oracle Secure Global Desktop (SGD) component of Oracle Virtualization (subcomponent: Apache Tomcat).  Supported versions that are affected are SGD prior to 4.71 with December 2013 PSU and  5.0 with December 2013 PSU. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Secure Global Desktop (SGD) accessible data.   Note: SGD releases prior to SGD 4.7 are not affected by CVE-2013-2071 as they do
not ship with Apache Tomcat 7.x, which is the only affected release of Tomcat. CVSS Base Score 2.6 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2071</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8539V-SGD prior to 4.71 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-5.0 with December 2013 PSU</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.6</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8539V-SGD prior to 4.71 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-5.0 with December 2013 PSU</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="19" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-2924</Title>
      <Notes>
         <Note Audience="All" Ordinal="19" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)).   The supported version that is affected is 11.1. Difficult to exploit vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris.  CVSS Base Score 1.9 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:L/AC:M/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-2924</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>1.9</BaseScore>
            <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-11.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="20" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-3830</Title>
      <Notes>
         <Note Audience="All" Ordinal="20" Title="Details" Type="Details">Vulnerability in the Hyperion Strategic Finance component of Oracle Hyperion (subcomponent: Server).  Supported versions that are affected are 11.1.2.1 and  11.1.2.2. Very difficult to exploit vulnerability allows successful authenticated network attacks via Microsoft RPC.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.  CVSS Base Score 7.1 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:S/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:H/Au:S/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-3830</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4408V-11.1.2.1</ProductID>
            <ProductID>P-4408V-11.1.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.1</BaseScore>
            <Vector>AV:N/AC:H/Au:S/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-4408V-11.1.2.1</ProductID>
            <ProductID>P-4408V-11.1.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="21" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-4316</Title>
      <Notes>
         <Note Audience="All" Ordinal="21" Title="Details" Type="Details">Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Service Manager).  Supported versions that are affected are 3.0.4 and earlier and  2.3.14 and earlier. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: The following CVEs are fixed as a result of upgrading to Struts 2.3.15.3: CVE-2013-4316 and CVE-2013-4310. The CVSS score is taken from 
&lt;A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4316"&gt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4316&lt;/a&gt;. The CVSS score is 10.0 if MySQL Enterprise Monitor runs with admin or root privileges. The score would be 7.5 if MySQL Enterprise Monitor runs with non-admin privileges and the impact on Confidentiality, Integrity and Availability would be Partial+. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-4316</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8480V-3.0.4 and earlier</ProductID>
            <ProductID>P-8480V-2.3.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8480V-3.0.4 and earlier</ProductID>
            <ProductID>P-8480V-2.3.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="22" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-4316</Title>
      <Notes>
         <Note Audience="All" Ordinal="22" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Software (subcomponent: Core).  Supported versions that are affected are 1.7, 2.0, 2.0.1, 2.2.0.1, 3.0, 12.0.1 and  12.0.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: The following CVEs are fixed as a result of upgrading to Struts 2.3.15.3: CVE-2013-4316 and CVE-2013-4310. The CVSS score is taken from 
&lt;A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4316"&gt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4316&lt;/a&gt;. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-4316</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9110V-1.7</ProductID>
            <ProductID>P-9110V-2.0</ProductID>
            <ProductID>P-9110V-2.0.1</ProductID>
            <ProductID>P-9110V-2.2.0.1</ProductID>
            <ProductID>P-9110V-3.0</ProductID>
            <ProductID>P-9110V-12.0.1</ProductID>
            <ProductID>P-9110V-12.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-9110V-1.7</ProductID>
            <ProductID>P-9110V-2.0</ProductID>
            <ProductID>P-9110V-2.0.1</ProductID>
            <ProductID>P-9110V-2.2.0.1</ProductID>
            <ProductID>P-9110V-3.0</ProductID>
            <ProductID>P-9110V-12.0.1</ProductID>
            <ProductID>P-9110V-12.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="23" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-4316</Title>
      <Notes>
         <Note Audience="All" Ordinal="23" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: WebCenter Sites Community).  Supported versions that are affected are 11.1.1.6.1 and  11.1.1.8.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: The following CVEs are fixed as a result of upgrading to Struts 2.3.15.3: CVE-2013-4316, CVE-2013-2251, CVE-2013-2248, CVE-2013-2135 and CVE-2013-2134.
The CVSS score is taken from 
&lt;A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4316"&gt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4316&lt;/a&gt;. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-4316</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9617V-11.1.1.6.1</ProductID>
            <ProductID>P-9617V-11.1.1.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-9617V-11.1.1.6.1</ProductID>
            <ProductID>P-9617V-11.1.1.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="24" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5764</Title>
      <Notes>
         <Note Audience="All" Ordinal="24" Title="Details" Type="Details">Vulnerability in the Core RDBMS component of Oracle Database Server.  This vulnerability requires Create Session, Alter Session privileges for a successful attack.  Supported versions that are affected are 11.1.0.7, 11.2.0.3 and  12.1.0.1. Difficult to exploit vulnerability allows successful authenticated network attacks via Oracle Net.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Core RDBMS.  CVSS Base Score 3.5 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5764</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.1.0.7</ProductID>
            <ProductID>P-5V-11.2.0.3</ProductID>
            <ProductID>P-5V-12.1.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5V-11.1.0.7</ProductID>
            <ProductID>P-5V-11.2.0.3</ProductID>
            <ProductID>P-5V-12.1.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="25" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5785</Title>
      <Notes>
         <Note Audience="All" Ordinal="25" Title="Details" Type="Details">Vulnerability in the Oracle Reports Developer component of Oracle Fusion Middleware (subcomponent: Security and Authentication).  Supported versions that are affected are 11.1.1.6, 11.1.1.7 and  11.1.2.1. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized takeover of Oracle Reports Developer possibly including arbitrary code execution within the Oracle Reports Developer.   Note: Please refer to Doc ID &lt;A HREF="http://support.oracle.com/CSP/main/article?cmd=show&amp;type=NOT&amp;id=1608683.1"&gt;My Oracle Support Note 1608683.1&lt;/a&gt; for instructions on how to address this issue. CVSS Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:P+/I:P+/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5785</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-159V-11.1.1.6</ProductID>
            <ProductID>P-159V-11.1.1.7</ProductID>
            <ProductID>P-159V-11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-159V-11.1.1.6</ProductID>
            <ProductID>P-159V-11.1.1.7</ProductID>
            <ProductID>P-159V-11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="26" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5795</Title>
      <Notes>
         <Note Audience="All" Ordinal="26" Title="Details" Type="Details">Vulnerability in the Oracle Demantra Demand Management component of Oracle Supply Chain Products Suite (subcomponent: DM Others).  Supported versions that are affected are 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.0, 12.2.1, 12.2.2 and  12.2.3. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to all Oracle Demantra Demand Management accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P+/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5795</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0</ProductID>
            <ProductID>P-2100V-7.3.1</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
            <ProductID>P-2100V-12.2.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0</ProductID>
            <ProductID>P-2100V-7.3.1</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
            <ProductID>P-2100V-12.2.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="27" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5808</Title>
      <Notes>
         <Note Audience="All" Ordinal="27" Title="Details" Type="Details">Vulnerability in the Oracle iPlanet Web Proxy Server component of Oracle Fusion Middleware (subcomponent: Administration).   The supported version that is affected is 4.0. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle iPlanet Web Proxy Server accessible data.  CVSS Base Score 2.6 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5808</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8542V-4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.6</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8542V-4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="28" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5821</Title>
      <Notes>
         <Note Audience="All" Ordinal="28" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Remote Procedure Call (RPC)).  Supported versions that are affected are 8, 9, 10 and  11.1. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Solaris accessible data as well as  read access to a subset of Solaris accessible data and ability to cause a partial denial of service (partial DOS) of Solaris.  CVSS Base Score 4.6 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5821</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-8</ProductID>
            <ProductID>P-10006V-9</ProductID>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.6</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-8</ProductID>
            <ProductID>P-10006V-9</ProductID>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="29" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5833</Title>
      <Notes>
         <Note Audience="All" Ordinal="29" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Filesystem).  Supported versions that are affected are 8 and  9. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 4.9 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C).  Oracle Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5833</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-8</ProductID>
            <ProductID>P-10006V-9</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-8</ProductID>
            <ProductID>P-10006V-9</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="30" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5834</Title>
      <Notes>
         <Note Audience="All" Ordinal="30" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: "ps" command line utility).   The supported version that is affected is 8. Very difficult to exploit vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.  CVSS Base Score 6.2 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:L/AC:H/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5834</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.2</BaseScore>
            <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="31" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5853</Title>
      <Notes>
         <Note Audience="All" Ordinal="31" Title="Details" Type="Details">Vulnerability in the Core RDBMS component of Oracle Database Server.  Supported versions that are affected are 11.1.0.7, 11.2.0.3 and  12.1.0.1. Easily exploitable vulnerability allows successful unauthenticated network attacks via Oracle Net.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Core RDBMS.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5853</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.1.0.7</ProductID>
            <ProductID>P-5V-11.2.0.3</ProductID>
            <ProductID>P-5V-12.1.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5V-11.1.0.7</ProductID>
            <ProductID>P-5V-11.2.0.3</ProductID>
            <ProductID>P-5V-12.1.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="32" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5858</Title>
      <Notes>
         <Note Audience="All" Ordinal="32" Title="Details" Type="Details">Vulnerability in the Core RDBMS component of Oracle Database Server.  This vulnerability requires Create Session, Create View privileges for a successful attack.  Supported versions that are affected are 11.1.0.7, 11.2.0.3, 11.2.0.4 and  12.1.0.1. Easily exploitable vulnerability allows successful authenticated network attacks via Oracle Net.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Core RDBMS accessible data.  CVSS Base Score 4.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5858</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.1.0.7</ProductID>
            <ProductID>P-5V-11.2.0.3</ProductID>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5V-11.1.0.7</ProductID>
            <ProductID>P-5V-11.2.0.3</ProductID>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="33" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5860</Title>
      <Notes>
         <Note Audience="All" Ordinal="33" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: GIS).  Supported versions that are affected are 5.6.14 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 6.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5860</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="34" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5868</Title>
      <Notes>
         <Note Audience="All" Ordinal="34" Title="Details" Type="Details">Vulnerability in the Oracle AutoVue component of Oracle Supply Chain Products Suite (subcomponent: Web General).   The supported version that is affected is 20.1.1. Difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to all Oracle AutoVue accessible data.  CVSS Base Score 3.5 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:P+/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5868</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4453V-20.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-4453V-20.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="35" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5869</Title>
      <Notes>
         <Note Audience="All" Ordinal="35" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Portal component of Oracle Fusion Middleware (subcomponent: Page Service).  Supported versions that are affected are 11.1.1.6.0, 11.1.1.7.0 and 11.1.1.8.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle WebCenter Portal accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5869</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1696V-11.1.1.6.0</ProductID>
            <ProductID>P-1696V-11.1.1.7.0</ProductID>
            <ProductID>P-1696V-11.1.1.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1696V-11.1.1.6.0</ProductID>
            <ProductID>P-1696V-11.1.1.7.0</ProductID>
            <ProductID>P-1696V-11.1.1.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="36" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5870</Title>
      <Notes>
         <Note Audience="All" Ordinal="36" Title="Details" Type="Details">Vulnerability in the Java SE, JavaFX component of Oracle Java SE (subcomponent: JavaFX).  Supported versions that are affected are Java SE 7u45 and  JavaFX 2.2.45. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE, JavaFX accessible data as well as  read access to a subset of Java SE, JavaFX accessible data and ability to cause a partial denial of service (partial DOS) of Java SE, JavaFX.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 6.8 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5870</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JavaFX 2.2.45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JavaFX 2.2.45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="37" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5871</Title>
      <Notes>
         <Note Audience="All" Ordinal="37" Title="Details" Type="Details">Vulnerability in the Oracle AutoVue component of Oracle Supply Chain Products Suite (subcomponent: Web General).   The supported version that is affected is 20.1.1. Difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle AutoVue accessible data.  CVSS Base Score 3.5 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5871</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4453V-20.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-4453V-20.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="38" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5872</Title>
      <Notes>
         <Note Audience="All" Ordinal="38" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Name Service Cache Daemon (NSCD)).  Supported versions that are affected are 10 and  11.1. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris.  CVSS Base Score 2.1 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5872</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.1</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="39" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5873</Title>
      <Notes>
         <Note Audience="All" Ordinal="39" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker).  Supported versions that are affected are 8.52 and  8.53. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5873</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="40" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5874</Title>
      <Notes>
         <Note Audience="All" Ordinal="40" Title="Details" Type="Details">Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Logging).  Supported versions that are affected are 11.5.10.2, 12.0.6, 12.1.3 and  12.2.2. Easily exploitable vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized  read access to a subset of Oracle Application Object Library accessible data.  CVSS Base Score 1.7 (Confidentiality impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:L/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5874</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-510V-11.5.10.2</ProductID>
            <ProductID>P-510V-12.0.6</ProductID>
            <ProductID>P-510V-12.1.3</ProductID>
            <ProductID>P-510V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>1.7</BaseScore>
            <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-510V-11.5.10.2</ProductID>
            <ProductID>P-510V-12.0.6</ProductID>
            <ProductID>P-510V-12.1.3</ProductID>
            <ProductID>P-510V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="41" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5875</Title>
      <Notes>
         <Note Audience="All" Ordinal="41" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Role Based Access Control (RBAC)).   The supported version that is affected is 11.1. Difficult to exploit vulnerability requiring logon to Operating System plus additional, multiple logins to components.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized  update, insert or delete access to some Solaris accessible data and ability to cause a partial denial of service (partial DOS) of Solaris.  CVSS Base Score 2.7 (Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:M/C:N/I:P/A:P).  Oracle Vector: (AV:L/AC:M/Au:M/C:N/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5875</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.7</BaseScore>
            <Vector>AV:L/AC:M/Au:M/C:N/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-11.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="42" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5876</Title>
      <Notes>
         <Note Audience="All" Ordinal="42" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Kernel).  Supported versions that are affected are 10 and  11.1. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 4.9 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C).  Oracle Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5876</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="43" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5877</Title>
      <Notes>
         <Note Audience="All" Ordinal="43" Title="Details" Type="Details">Vulnerability in the Oracle Demantra Demand Management component of Oracle Supply Chain Products Suite (subcomponent: DM Others).  Supported versions that are affected are 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.0 and  12.2.1. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Demantra Demand Management accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5877</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0</ProductID>
            <ProductID>P-2100V-7.3.1</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0</ProductID>
            <ProductID>P-2100V-7.3.1</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="44" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5878</Title>
      <Notes>
         <Note Audience="All" Ordinal="44" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security).  Supported versions that are affected are Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE, Java SE Embedded accessible data as well as  read access to a subset of Java SE, Java SE Embedded accessible data and ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5878</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="45" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5879</Title>
      <Notes>
         <Note Audience="All" Ordinal="45" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Maintenance).  Supported versions that are affected are 8.4.0 and  8.4.1. Difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.   Note: Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS Base Score would increase to 6.8. CVSS Base Score 1.5 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:L/AC:M/Au:S/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5879</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.4.0</ProductID>
            <ProductID>P-2276V-8.4.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>1.5</BaseScore>
            <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-2276V-8.4.0</ProductID>
            <ProductID>P-2276V-8.4.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="46" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5880</Title>
      <Notes>
         <Note Audience="All" Ordinal="46" Title="Details" Type="Details">Vulnerability in the Oracle Demantra Demand Management component of Oracle Supply Chain Products Suite (subcomponent: DM Others).  Supported versions that are affected are 12.2.0, 12.2.1 and  12.2.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Demantra Demand Management accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5880</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="47" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5881</Title>
      <Notes>
         <Note Audience="All" Ordinal="47" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.6.14 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5881</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="48" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5882</Title>
      <Notes>
         <Note Audience="All" Ordinal="48" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure).  Supported versions that are affected are 5.6.13 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 6.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5882</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="49" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5883</Title>
      <Notes>
         <Note Audience="All" Ordinal="49" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Kernel).   The supported version that is affected is 8. Easily exploitable vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized  update, insert or delete access to some Solaris accessible data and ability to cause a partial denial of service (partial DOS) of Solaris.   Note: Applies only when Solaris is running on SPARC platform. CVSS Base Score 3.2 (Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:S/C:N/I:P/A:P).  Oracle Vector: (AV:L/AC:L/Au:S/C:N/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5883</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.2</BaseScore>
            <Vector>AV:L/AC:L/Au:S/C:N/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="50" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5884</Title>
      <Notes>
         <Note Audience="All" Ordinal="50" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: CORBA ).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java SE, Java SE Embedded accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5884</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="51" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5885</Title>
      <Notes>
         <Note Audience="All" Ordinal="51" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Audit).   The supported version that is affected is 11.1. Easily exploitable vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized  update, insert or delete access to some Solaris accessible data.  CVSS Base Score 1.7 (Integrity impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:S/C:N/I:P/A:N).  Oracle Vector: (AV:L/AC:L/Au:S/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5885</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>1.7</BaseScore>
            <Vector>AV:L/AC:L/Au:S/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-11.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="52" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5886</Title>
      <Notes>
         <Note Audience="All" Ordinal="52" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise HRMS component of Oracle PeopleSoft Products (subcomponent: Common Application Objects).  Supported versions that are affected are 9.1 and  9.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft Enterprise HRMS accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5886</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8911V-9.1</ProductID>
            <ProductID>P-8911V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8911V-9.1</ProductID>
            <ProductID>P-8911V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="53" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5887</Title>
      <Notes>
         <Note Audience="All" Ordinal="53" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5887</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="54" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5888</Title>
      <Notes>
         <Note Audience="All" Ordinal="54" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to client deployment of Java under GNOME environment on Linux and Solaris. CVSS Base Score 4.6 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5888</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.6</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="55" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5889</Title>
      <Notes>
         <Note Audience="All" Ordinal="55" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 9.3 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="56" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5890</Title>
      <Notes>
         <Note Audience="All" Ordinal="56" Title="Details" Type="Details">Vulnerability in the Oracle Payroll component of Oracle E-Business Suite (subcomponent: Exception Reporting).  Supported versions that are affected are 11.5.10.2, 12.0.6, 12.1.1, 12.1.2, 12.1.3 and 12.2.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all Oracle Payroll accessible data as well as  read access to all Oracle Payroll accessible data.  CVSS Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P+/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5890</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-506V-11.5.10.2</ProductID>
            <ProductID>P-506V-12.0.6</ProductID>
            <ProductID>P-506V-12.1.1</ProductID>
            <ProductID>P-506V-12.1.2</ProductID>
            <ProductID>P-506V-12.1.3</ProductID>
            <ProductID>P-506V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-506V-11.5.10.2</ProductID>
            <ProductID>P-506V-12.0.6</ProductID>
            <ProductID>P-506V-12.1.1</ProductID>
            <ProductID>P-506V-12.1.2</ProductID>
            <ProductID>P-506V-12.1.3</ProductID>
            <ProductID>P-506V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="57" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5891</Title>
      <Notes>
         <Note Audience="All" Ordinal="57" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Partition).  Supported versions that are affected are 5.5.33 and earlier and  5.6.13 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5891</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.33 and earlier</ProductID>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.5.33 and earlier</ProductID>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="58" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5892</Title>
      <Notes>
         <Note Audience="All" Ordinal="58" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).  Supported versions that are affected are VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.22 and  4.3.6. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized takeover of Oracle VM VirtualBox possibly including arbitrary code execution within the Oracle VM VirtualBox.  CVSS Base Score 3.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:S/C:P/I:P/A:P).  Oracle Vector: (AV:L/AC:H/Au:S/C:P+/I:P+/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5892</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.22</ProductID>
            <ProductID>P-8370V-4.3.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.22</ProductID>
            <ProductID>P-8370V-4.3.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="59" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5893</Title>
      <Notes>
         <Note Audience="All" Ordinal="59" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries).  Supported versions that are affected are Java SE 7u45 and  Java SE Embedded 7u45. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 9.3 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5893</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="60" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5894</Title>
      <Notes>
         <Note Audience="All" Ordinal="60" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.6.13 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5894</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="61" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5895</Title>
      <Notes>
         <Note Audience="All" Ordinal="61" Title="Details" Type="Details">Vulnerability in the Java SE, JavaFX component of Oracle Java SE (subcomponent: JavaFX).  Supported versions that are affected are Java SE 7u45 and  JavaFX 2.2.45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java SE, JavaFX accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5895</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JavaFX 2.2.45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JavaFX 2.2.45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="62" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5896</Title>
      <Notes>
         <Note Audience="All" Ordinal="62" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: CORBA).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5896</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="63" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5897</Title>
      <Notes>
         <Note Audience="All" Ordinal="63" Title="Details" Type="Details">Vulnerability in the Oracle Agile Product Lifecycle Management for Process component of Oracle Supply Chain Products Suite (subcomponent: Manage Data Cache).  Supported versions that are affected are 6.0, 6.1 and  6.1.1. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all Oracle Agile Product Lifecycle Management for Process accessible data as well as  read access to all Oracle Agile Product Lifecycle Management for Process accessible data.  CVSS Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P+/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5897</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4445V-6.0</ProductID>
            <ProductID>P-4445V-6.1</ProductID>
            <ProductID>P-4445V-6.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-4445V-6.0</ProductID>
            <ProductID>P-4445V-6.1</ProductID>
            <ProductID>P-4445V-6.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="64" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5898</Title>
      <Notes>
         <Note Audience="All" Ordinal="64" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 4.0 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5898</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="65" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5899</Title>
      <Notes>
         <Note Audience="All" Ordinal="65" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java SE accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5899</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="66" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5900</Title>
      <Notes>
         <Note Audience="All" Ordinal="66" Title="Details" Type="Details">Vulnerability in the Oracle Identity Manager component of Oracle Fusion Middleware (subcomponent: End User Self Service).  Supported versions that are affected are 11.1.1.5, 11.1.1.7, 11.1.2.0 and  11.1.2.1. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Identity Manager accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5900</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1980V-11.1.1.5</ProductID>
            <ProductID>P-1980V-11.1.1.7</ProductID>
            <ProductID>P-1980V-11.1.2.0</ProductID>
            <ProductID>P-1980V-11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1980V-11.1.1.5</ProductID>
            <ProductID>P-1980V-11.1.1.7</ProductID>
            <ProductID>P-1980V-11.1.2.0</ProductID>
            <ProductID>P-1980V-11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="67" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5901</Title>
      <Notes>
         <Note Audience="All" Ordinal="67" Title="Details" Type="Details">Vulnerability in the Oracle Identity Manager component of Oracle Fusion Middleware (subcomponent: Identity Console).  Supported versions that are affected are 11.1.2.0 and  11.1.2.1. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to all Oracle Identity Manager accessible data.  CVSS Base Score 4.3 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P+/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5901</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1980V-11.1.2.0</ProductID>
            <ProductID>P-1980V-11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1980V-11.1.2.0</ProductID>
            <ProductID>P-1980V-11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="68" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5902</Title>
      <Notes>
         <Note Audience="All" Ordinal="68" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.1 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5902</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.1</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="69" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5904</Title>
      <Notes>
         <Note Audience="All" Ordinal="69" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).   The supported version that is affected is Java SE 7u45. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 6.8 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5904</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="70" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5905</Title>
      <Notes>
         <Note Audience="All" Ordinal="70" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65 and  Java SE 7u45. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to installation process on client deployment of Java. CVSS Base Score 5.1 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5905</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.1</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="71" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5906</Title>
      <Notes>
         <Note Audience="All" Ordinal="71" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65 and  Java SE 7u45. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to installation process on client deployment of Java. CVSS Base Score 5.1 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5906</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.1</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="72" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5907</Title>
      <Notes>
         <Note Audience="All" Ordinal="72" Title="Details" Type="Details">Vulnerability in the Java SE, JRockit, Java SE Embedded component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45, JRockit R27.7.7, JRockit R28.2.9 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5907</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JRockit R27.7.7</ProductID>
            <ProductID>P-856V-JRockit R28.2.9</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JRockit R27.7.7</ProductID>
            <ProductID>P-856V-JRockit R28.2.9</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="73" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5908</Title>
      <Notes>
         <Note Audience="All" Ordinal="73" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Error Handling).  Supported versions that are affected are 5.1.72 and earlier, 5.5.34 and earlier and  5.6.14 and earlier. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 2.6 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.72 and earlier</ProductID>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.6</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.1.72 and earlier</ProductID>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="74" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5909</Title>
      <Notes>
         <Note Audience="All" Ordinal="74" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise HRMS component of Oracle PeopleSoft Products (subcomponent: Org and Workforce Dev).  Supported versions that are affected are 9.1 and  9.2. Difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft Enterprise HRMS accessible data as well as  read access to a subset of PeopleSoft Enterprise HRMS accessible data.  CVSS Base Score 4.9 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5909</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5071V-9.1</ProductID>
            <ProductID>P-5071V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5071V-9.1</ProductID>
            <ProductID>P-5071V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="75" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-5910</Title>
      <Notes>
         <Note Audience="All" Ordinal="75" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security).  Supported versions that are affected are Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE, Java SE Embedded accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-5910</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="76" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0366</Title>
      <Notes>
         <Note Audience="All" Ordinal="76" Title="Details" Type="Details">Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: Attachments).  Supported versions that are affected are 11.5.10.2, 12.0.6, 12.1.3 and  12.2.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Applications Framework accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0366</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1472V-11.5.10.2</ProductID>
            <ProductID>P-1472V-12.0.6</ProductID>
            <ProductID>P-1472V-12.1.3</ProductID>
            <ProductID>P-1472V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1472V-11.5.10.2</ProductID>
            <ProductID>P-1472V-12.0.6</ProductID>
            <ProductID>P-1472V-12.1.3</ProductID>
            <ProductID>P-1472V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="77" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0367</Title>
      <Notes>
         <Note Audience="All" Ordinal="77" Title="Details" Type="Details">Vulnerability in the Hyperion Essbase Administration Services component of Oracle Hyperion (subcomponent: Admin Console).  Supported versions that are affected are 11.1.2.1, 11.1.2.2 and  11.1.2.3. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Hyperion Essbase Administration Services accessible data as well as  read access to a subset of Hyperion Essbase Administration Services accessible data.  CVSS Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0367</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4380V-11.1.2.1</ProductID>
            <ProductID>P-4380V-11.1.2.2</ProductID>
            <ProductID>P-4380V-11.1.2.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-4380V-11.1.2.1</ProductID>
            <ProductID>P-4380V-11.1.2.2</ProductID>
            <ProductID>P-4380V-11.1.2.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="78" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0368</Title>
      <Notes>
         <Note Audience="All" Ordinal="78" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java SE, Java SE Embedded accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0368</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="79" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0369</Title>
      <Notes>
         <Note Audience="All" Ordinal="79" Title="Details" Type="Details">Vulnerability in the Siebel Core - EAI component of Oracle Siebel CRM (subcomponent: Java Integration).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Siebel Core - EAI accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0369</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9021V-8.1.1</ProductID>
            <ProductID>P-9021V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-9021V-8.1.1</ProductID>
            <ProductID>P-9021V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="80" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0370</Title>
      <Notes>
         <Note Audience="All" Ordinal="80" Title="Details" Type="Details">Vulnerability in the Siebel Life Sciences component of Oracle Siebel CRM (subcomponent: Clinical Trip Report).  Supported versions that are affected are 8.1.1 and  8.2.2. Difficult to exploit vulnerability allows successful network attacks via HTTP, requiring multiple authentications.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Siebel Life Sciences.  CVSS Base Score 2.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:M/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:M/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0370</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9173V-8.1.1</ProductID>
            <ProductID>P-9173V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.8</BaseScore>
            <Vector>AV:N/AC:M/Au:M/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-9173V-8.1.1</ProductID>
            <ProductID>P-9173V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="81" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0371</Title>
      <Notes>
         <Note Audience="All" Ordinal="81" Title="Details" Type="Details">Vulnerability in the Oracle Demantra Demand Management component of Oracle Supply Chain Products Suite (subcomponent: DM Others).  Supported versions that are affected are 7.2.0.3 SQL-Server, 7.3.0.x, 7.3.1.x, 12.2.0, 12.2.1 and  12.2.2. Difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Demantra Demand Management accessible data.  CVSS Base Score 3.5 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0371</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0.x</ProductID>
            <ProductID>P-2100V-7.3.1.x</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0.x</ProductID>
            <ProductID>P-2100V-7.3.1.x</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="82" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0372</Title>
      <Notes>
         <Note Audience="All" Ordinal="82" Title="Details" Type="Details">Vulnerability in the Oracle Demantra Demand Management component of Oracle Supply Chain Products Suite (subcomponent: DM Others).  Supported versions that are affected are 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.0, 12.2.1 and  12.2.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all Oracle Demantra Demand Management accessible data as well as  read access to all Oracle Demantra Demand Management accessible data.  CVSS Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P+/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0372</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0</ProductID>
            <ProductID>P-2100V-7.3.1</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0</ProductID>
            <ProductID>P-2100V-7.3.1</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="83" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0373</Title>
      <Notes>
         <Note Audience="All" Ordinal="83" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Serviceability ).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65 and  Java SE 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0373</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="84" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0374</Title>
      <Notes>
         <Note Audience="All" Ordinal="84" Title="Details" Type="Details">Vulnerability in the Oracle Portal component of Oracle Fusion Middleware (subcomponent: Page Parameters and Events).   The supported version that is affected is 11.1.1.6. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Portal accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0374</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-96V-11.1.1.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-96V-11.1.1.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="85" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0375</Title>
      <Notes>
         <Note Audience="All" Ordinal="85" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.8 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0375</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.8</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="86" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0376</Title>
      <Notes>
         <Note Audience="All" Ordinal="86" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE, Java SE Embedded accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0376</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="87" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0377</Title>
      <Notes>
         <Note Audience="All" Ordinal="87" Title="Details" Type="Details">Vulnerability in the Core RDBMS component of Oracle Database Server.  This vulnerability requires Create Session, Create Role, Create User, Select privilege on SYS tables. privileges for a successful attack.  Supported versions that are affected are 11.1.0.7, 11.2.0.3, 11.2.0.4 and  12.1.0.1. Easily exploitable vulnerability allows successful authenticated network attacks via Oracle Net.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Core RDBMS accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0377</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.1.0.7</ProductID>
            <ProductID>P-5V-11.2.0.3</ProductID>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5V-11.1.0.7</ProductID>
            <ProductID>P-5V-11.2.0.3</ProductID>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="88" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0378</Title>
      <Notes>
         <Note Audience="All" Ordinal="88" Title="Details" Type="Details">Vulnerability in the Spatial component of Oracle Database Server.  This vulnerability requires Local Login, Create Session privileges for a successful attack.  Supported versions that are affected are 11.1.0.7, 11.2.0.3, 11.2.0.4 and  12.1.0.1. Difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized  update, insert or delete access to some Spatial accessible data as well as  read access to a subset of Spatial accessible data and ability to cause a partial denial of service (partial DOS) of Spatial.  CVSS Base Score 4.1 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:S/C:P/I:P/A:P).  Oracle Vector: (AV:L/AC:M/Au:S/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0378</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-619V-11.1.0.7</ProductID>
            <ProductID>P-619V-11.2.0.3</ProductID>
            <ProductID>P-619V-11.2.0.4</ProductID>
            <ProductID>P-619V-12.1.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.1</BaseScore>
            <Vector>AV:L/AC:M/Au:S/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-619V-11.1.0.7</ProductID>
            <ProductID>P-619V-11.2.0.3</ProductID>
            <ProductID>P-619V-11.2.0.4</ProductID>
            <ProductID>P-619V-12.1.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="89" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0379</Title>
      <Notes>
         <Note Audience="All" Ordinal="89" Title="Details" Type="Details">Vulnerability in the Oracle Demantra Demand Management component of Oracle Supply Chain Products Suite (subcomponent: DM Others).  Supported versions that are affected are 7.2.0.3 SQL-Server, 7.3.0.x, 7.3.1.x, 12.2.0, 12.2.1 and  12.2.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Demantra Demand Management accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0379</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0.x</ProductID>
            <ProductID>P-2100V-7.3.1.x</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-2100V-7.2.0.3 SQL-Server</ProductID>
            <ProductID>P-2100V-7.3.0.x</ProductID>
            <ProductID>P-2100V-7.3.1.x</ProductID>
            <ProductID>P-2100V-12.2.0</ProductID>
            <ProductID>P-2100V-12.2.1</ProductID>
            <ProductID>P-2100V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="90" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0380</Title>
      <Notes>
         <Note Audience="All" Ordinal="90" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: MultiChannel Framework (MCF)).  Supported versions that are affected are 8.52 and  8.53. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0380</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="91" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0381</Title>
      <Notes>
         <Note Audience="All" Ordinal="91" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology).  Supported versions that are affected are 8.52 and  8.53. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 2.6 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0381</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.6</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="92" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0382</Title>
      <Notes>
         <Note Audience="All" Ordinal="92" Title="Details" Type="Details">Vulnerability in the Java SE, JavaFX component of Oracle Java SE (subcomponent: JavaFX).  Supported versions that are affected are Java SE 7u45 and  JavaFX 2.2.45. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JavaFX.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 4.3 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0382</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JavaFX 2.2.45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JavaFX 2.2.45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="93" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0383</Title>
      <Notes>
         <Note Audience="All" Ordinal="93" Title="Details" Type="Details">Vulnerability in the Oracle Identity Manager component of Oracle Fusion Middleware (subcomponent: Identity Console).  Supported versions that are affected are 11.1.2.0 and  11.1.2.1. Difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Identity Manager accessible data.  CVSS Base Score 3.5 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0383</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1980V-11.1.2.0</ProductID>
            <ProductID>P-1980V-11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1980V-11.1.2.0</ProductID>
            <ProductID>P-1980V-11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="94" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0385</Title>
      <Notes>
         <Note Audience="All" Ordinal="94" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install).   The supported version that is affected is Java SE 7u45 on OS X. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to installation process on client deployment of Java. CVSS Base Score 9.3 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0385</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 7u45 on OS X</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 7u45 on OS X</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="95" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0386</Title>
      <Notes>
         <Note Audience="All" Ordinal="95" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Optimizer).  Supported versions that are affected are 5.1.71 and earlier, 5.5.33 and earlier and  5.6.13 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0386</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.71 and earlier</ProductID>
            <ProductID>P-8478V-5.5.33 and earlier</ProductID>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.1.71 and earlier</ProductID>
            <ProductID>P-8478V-5.5.33 and earlier</ProductID>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="96" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0387</Title>
      <Notes>
         <Note Audience="All" Ordinal="96" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45 on Firefox. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 7.6 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0387</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45 on Firefox</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.6</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45 on Firefox</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="97" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0388</Title>
      <Notes>
         <Note Audience="All" Ordinal="97" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise HRMS Human Resources component of Oracle PeopleSoft Products (subcomponent: Org and Workforce Dev).  Supported versions that are affected are 9.1 and  9.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft Enterprise HRMS Human Resources accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0388</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5071V-9.1</ProductID>
            <ProductID>P-5071V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5071V-9.1</ProductID>
            <ProductID>P-5071V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="98" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0389</Title>
      <Notes>
         <Note Audience="All" Ordinal="98" Title="Details" Type="Details">Vulnerability in the Oracle iLearning component of Oracle iLearning (subcomponent: Learner Pages).   The supported version that is affected is 6.0. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle iLearning accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0389</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-902V-6.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-902V-6.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="99" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0390</Title>
      <Notes>
         <Note Audience="All" Ordinal="99" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Java Web Console).   The supported version that is affected is 10. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Solaris accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0390</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="100" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0391</Title>
      <Notes>
         <Note Audience="All" Ordinal="100" Title="Details" Type="Details">Vulnerability in the Oracle Identity Manager component of Oracle Fusion Middleware (subcomponent: End User Self Service).  Supported versions that are affected are 11.1.1.5, 11.1.1.7, 11.1.2.0 and 11.1.2.1. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Identity Manager accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0391</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1980V-11.1.1.5</ProductID>
            <ProductID>P-1980V-11.1.1.7</ProductID>
            <ProductID>P-1980V-11.1.2.0</ProductID>
            <ProductID>P-1980V-11.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1980V-11.1.1.5</ProductID>
            <ProductID>P-1980V-11.1.1.7</ProductID>
            <ProductID>P-1980V-11.1.2.0</ProductID>
            <ProductID>P-1980V-11.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="101" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0392</Title>
      <Notes>
         <Note Audience="All" Ordinal="101" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise HRMS component of Oracle PeopleSoft Products (subcomponent: Security).  Supported versions that are affected are 9.1 and  9.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft Enterprise HRMS accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0392</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5052V-9.1</ProductID>
            <ProductID>P-5052V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5052V-9.1</ProductID>
            <ProductID>P-5052V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="102" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0393</Title>
      <Notes>
         <Note Audience="All" Ordinal="102" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.1.71 and earlier, 5.5.33 and earlier and  5.6.13 and earlier. Easily exploitable vulnerability allows successful network attacks via multiple protocols, requiring multiple authentications.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some MySQL Server accessible data.  CVSS Base Score 3.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:M/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:M/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0393</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.71 and earlier</ProductID>
            <ProductID>P-8478V-5.5.33 and earlier</ProductID>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.3</BaseScore>
            <Vector>AV:N/AC:L/Au:M/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.1.71 and earlier</ProductID>
            <ProductID>P-8478V-5.5.33 and earlier</ProductID>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="103" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0394</Title>
      <Notes>
         <Note Audience="All" Ordinal="103" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Updates Environment Mgmt).  Supported versions that are affected are 8.52 and  8.53. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0394</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="104" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0395</Title>
      <Notes>
         <Note Audience="All" Ordinal="104" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Updates Environment Mgmt).  Supported versions that are affected are 8.52 and  8.53. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0395</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="105" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0396</Title>
      <Notes>
         <Note Audience="All" Ordinal="105" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Portal - Web Services).  Supported versions that are affected are 8.52 and  8.53. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0396</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="106" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0398</Title>
      <Notes>
         <Note Audience="All" Ordinal="106" Title="Details" Type="Details">Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Discoverer).  Supported versions that are affected are 11.5.10.2, 12.0.6, 12.1.3 and 12.2.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Application Object Library accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0398</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-510V-11.5.10.2</ProductID>
            <ProductID>P-510V-12.0.6</ProductID>
            <ProductID>P-510V-12.1.3</ProductID>
            <ProductID>P-510V-12.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-510V-11.5.10.2</ProductID>
            <ProductID>P-510V-12.0.6</ProductID>
            <ProductID>P-510V-12.1.3</ProductID>
            <ProductID>P-510V-12.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="107" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0399</Title>
      <Notes>
         <Note Audience="All" Ordinal="107" Title="Details" Type="Details">Vulnerability in the Oracle Transportation Management component of Oracle Supply Chain Products Suite (subcomponent: Data, Domain &amp; Function Security).  Supported versions that are affected are 6.2, 6.3, 6.3.1 and  6.3.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Transportation Management accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0399</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="108" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0400</Title>
      <Notes>
         <Note Audience="All" Ordinal="108" Title="Details" Type="Details">Vulnerability in the Oracle Internet Directory component of Oracle Fusion Middleware (subcomponent: OID LDAP server).  Supported versions that are affected are 11.1.1.6 and  11.1.1.7. Difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to any arbitrary Operating System location.  CVSS Base Score 6.3 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:C/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:C/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0400</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-355V-11.1.1.6</ProductID>
            <ProductID>P-355V-11.1.1.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.3</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:C/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-355V-11.1.1.6</ProductID>
            <ProductID>P-355V-11.1.1.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="109" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0401</Title>
      <Notes>
         <Note Audience="All" Ordinal="109" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Privileges).  Supported versions that are affected are 5.1.72 and earlier, 5.5.34 and earlier and  5.6.14 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0401</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.72 and earlier</ProductID>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.1.72 and earlier</ProductID>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="110" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0402</Title>
      <Notes>
         <Note Audience="All" Ordinal="110" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Locking).  Supported versions that are affected are 5.1.71 and earlier, 5.5.33 and earlier and  5.6.13 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0402</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.71 and earlier</ProductID>
            <ProductID>P-8478V-5.5.33 and earlier</ProductID>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.1.71 and earlier</ProductID>
            <ProductID>P-8478V-5.5.33 and earlier</ProductID>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="111" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0403</Title>
      <Notes>
         <Note Audience="All" Ordinal="111" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.8 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0403</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.8</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="112" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0404</Title>
      <Notes>
         <Note Audience="All" Ordinal="112" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).  Supported versions that are affected are VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20 and  4.3.4. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as  update, insert or delete access to some Oracle VM VirtualBox accessible data.  CVSS Base Score 2.4 (Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:S/C:N/I:P/A:P).  Oracle Vector: (AV:L/AC:H/Au:S/C:N/I:P/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0404</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.20</ProductID>
            <ProductID>P-8370V-4.3.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.4</BaseScore>
            <Vector>AV:L/AC:H/Au:S/C:N/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.20</ProductID>
            <ProductID>P-8370V-4.3.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="113" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0405</Title>
      <Notes>
         <Note Audience="All" Ordinal="113" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).  Supported versions that are affected are VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20 and  4.3.4. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized  update, insert or delete access to some Oracle VM VirtualBox accessible data as well as  read access to a subset of Oracle VM VirtualBox accessible data and ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox.   Note: Applies only when a Windows guest with VirtualBox Additions installed is running on VirtualBox. CVSS Base Score 3.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:S/C:P/I:P/A:P).  Oracle Vector: (AV:L/AC:H/Au:S/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0405</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.20</ProductID>
            <ProductID>P-8370V-4.3.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.20</ProductID>
            <ProductID>P-8370V-4.3.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="114" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0406</Title>
      <Notes>
         <Note Audience="All" Ordinal="114" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).  Supported versions that are affected are VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20 and  4.3.4. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized  update, insert or delete access to all Oracle VM VirtualBox accessible data and ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox.  CVSS Base Score 2.4 (Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:S/C:N/I:P/A:P).  Oracle Vector: (AV:L/AC:H/Au:S/C:N/I:P+/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0406</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.20</ProductID>
            <ProductID>P-8370V-4.3.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.4</BaseScore>
            <Vector>AV:L/AC:H/Au:S/C:N/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.20</ProductID>
            <ProductID>P-8370V-4.3.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="115" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0407</Title>
      <Notes>
         <Note Audience="All" Ordinal="115" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core).  Supported versions that are affected are VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20 and  4.3.4. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized takeover of Oracle VM VirtualBox possibly including arbitrary code execution within the Oracle VM VirtualBox.  CVSS Base Score 3.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:S/C:P/I:P/A:P).  Oracle Vector: (AV:L/AC:H/Au:S/C:P+/I:P+/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0407</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.20</ProductID>
            <ProductID>P-8370V-4.3.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8370V-VirtualBox prior to 3.2.20</ProductID>
            <ProductID>P-8370V-4.0.22</ProductID>
            <ProductID>P-8370V-4.1.30</ProductID>
            <ProductID>P-8370V-4.2.20</ProductID>
            <ProductID>P-8370V-4.3.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="116" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0408</Title>
      <Notes>
         <Note Audience="All" Ordinal="116" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Hotspot).   The supported version that is affected is Java SE 7u45 on OS X. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 9.3 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0408</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 7u45 on OS X</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 7u45 on OS X</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="117" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0410</Title>
      <Notes>
         <Note Audience="All" Ordinal="117" Title="Details" Type="Details">Vulnerability in the Java SE  component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0410</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="118" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0411</Title>
      <Notes>
         <Note Audience="All" Ordinal="118" Title="Details" Type="Details">Vulnerability in the Java SE, JRockit, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45, JRockit R27.7.7, JRockit R28.2.9 and  Java SE Embedded 7u45. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via SSL/TLS.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE, JRockit, Java SE Embedded accessible data as well as  read access to a subset of Java SE, JRockit, Java SE Embedded accessible data.   Note: Applies to client and server deployment of JSSE. CVSS Base Score 4.0 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0411</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JRockit R27.7.7</ProductID>
            <ProductID>P-856V-JRockit R28.2.9</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JRockit R27.7.7</ProductID>
            <ProductID>P-856V-JRockit R28.2.9</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="119" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0412</Title>
      <Notes>
         <Note Audience="All" Ordinal="119" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.1.72 and earlier, 5.5.34 and earlier and  5.6.14 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0412</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.72 and earlier</ProductID>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.1.72 and earlier</ProductID>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="120" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0415</Title>
      <Notes>
         <Note Audience="All" Ordinal="120" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0415</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="121" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0416</Title>
      <Notes>
         <Note Audience="All" Ordinal="121" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAAS).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE, Java SE Embedded accessible data.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0416</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="122" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0417</Title>
      <Notes>
         <Note Audience="All" Ordinal="122" Title="Details" Type="Details">Vulnerability in the Java SE, JavaFX, Java SE Embedded component of Oracle Java SE (subcomponent: 2D).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45, JavaFX 2.2.45 and  Java SE Embedded 7u45. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 9.3 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0417</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JavaFX 2.2.45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JavaFX 2.2.45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="123" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0418</Title>
      <Notes>
         <Note Audience="All" Ordinal="123" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 5.1 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0418</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.1</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="124" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0419</Title>
      <Notes>
         <Note Audience="All" Ordinal="124" Title="Details" Type="Details">Vulnerability in the Oracle Secure Global Desktop (SGD) component of Oracle Virtualization (subcomponent: Administration Console and Workspace Web Applications).  Supported versions that are affected are SGD prior to 4.63 with December 2013 PSU , 4.71, 5.0 with December 2013 PSU and  5.10. Very difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Secure Global Desktop (SGD) accessible data as well as  read access to a subset of Oracle Secure Global Desktop (SGD) accessible data and ability to cause a partial denial of service (partial DOS) of Oracle Secure Global Desktop (SGD).  CVSS Base Score 5.1 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0419</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8539V-SGD prior to 4.63 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-4.71</ProductID>
            <ProductID>P-8539V-5.0 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-5.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.1</BaseScore>
            <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8539V-SGD prior to 4.63 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-4.71</ProductID>
            <ProductID>P-8539V-5.0 with December 2013 PSU</ProductID>
            <ProductID>P-8539V-5.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="125" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0420</Title>
      <Notes>
         <Note Audience="All" Ordinal="125" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Replication).  Supported versions that are affected are 5.5.34 and earlier and  5.6.14 and earlier. Difficult to exploit vulnerability allows successful network attacks via multiple protocols, requiring multiple authentications.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 2.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:M/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:M/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0420</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.8</BaseScore>
            <Vector>AV:N/AC:M/Au:M/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="126" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0422</Title>
      <Notes>
         <Note Audience="All" Ordinal="126" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JNDI).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0422</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="127" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0423</Title>
      <Notes>
         <Note Audience="All" Ordinal="127" Title="Details" Type="Details">Vulnerability in the Java SE, JRockit, Java SE Embedded component of Oracle Java SE (subcomponent: Beans).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45, JRockit R27.7.7, JRockit R28.2.9 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Java SE, JRockit, Java SE Embedded accessible data and ability to cause a partial denial of service (partial DOS) of Java SE, JRockit, Java SE Embedded.   Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS Base Score 5.5 (Confidentiality and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0423</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JRockit R27.7.7</ProductID>
            <ProductID>P-856V-JRockit R28.2.9</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-JRockit R27.7.7</ProductID>
            <ProductID>P-856V-JRockit R28.2.9</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="128" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0424</Title>
      <Notes>
         <Note Audience="All" Ordinal="128" Title="Details" Type="Details">Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment).  Supported versions that are affected are Java SE 6u65 and  Java SE 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Java SE accessible data as well as  read access to a subset of Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0424</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="129" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0425</Title>
      <Notes>
         <Note Audience="All" Ordinal="129" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise SCM Services Procurement component of Oracle PeopleSoft Products (subcomponent: Security).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft Enterprise SCM Services Procurement accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0425</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5135V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5135V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="130" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0427</Title>
      <Notes>
         <Note Audience="All" Ordinal="130" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: FTS).  Supported versions that are affected are 5.6.13 and earlier. Difficult to exploit vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 3.5 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0427</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="131" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0428</Title>
      <Notes>
         <Note Audience="All" Ordinal="131" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: CORBA).  Supported versions that are affected are Java SE 5.0u55, Java SE 6u65, Java SE 7u45 and  Java SE Embedded 7u45. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0428</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-856V-Java SE 5.0u55</ProductID>
            <ProductID>P-856V-Java SE 6u65</ProductID>
            <ProductID>P-856V-Java SE 7u45</ProductID>
            <ProductID>P-856V-Java SE Embedded 7u45</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="132" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0430</Title>
      <Notes>
         <Note Audience="All" Ordinal="132" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Performance Schema).  Supported versions that are affected are 5.6.13 and earlier. Difficult to exploit vulnerability allows successful network attacks via multiple protocols, requiring multiple authentications.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 2.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:M/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:M/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0430</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.8</BaseScore>
            <Vector>AV:N/AC:M/Au:M/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="133" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0431</Title>
      <Notes>
         <Note Audience="All" Ordinal="133" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.6.14 and earlier. Difficult to exploit vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 3.5 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0431</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="134" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0433</Title>
      <Notes>
         <Note Audience="All" Ordinal="134" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Thread Pooling).  Supported versions that are affected are 5.6.13 and earlier. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server.  CVSS Base Score 4.3 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0433</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.6.13 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="135" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0434</Title>
      <Notes>
         <Note Audience="All" Ordinal="135" Title="Details" Type="Details">Vulnerability in the Oracle Agile Product Lifecycle Management for Process component of Oracle Supply Chain Products Suite (subcomponent: Installation).  Supported versions that are affected are 6.0, 6.1 and  6.1.1. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Agile Product Lifecycle Management for Process accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4445V-6.0</ProductID>
            <ProductID>P-4445V-6.1</ProductID>
            <ProductID>P-4445V-6.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-4445V-6.0</ProductID>
            <ProductID>P-4445V-6.1</ProductID>
            <ProductID>P-4445V-6.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="136" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0435</Title>
      <Notes>
         <Note Audience="All" Ordinal="136" Title="Details" Type="Details">Vulnerability in the Oracle Transportation Management component of Oracle Supply Chain Products Suite (subcomponent: Data, Domain &amp; Function Security).  Supported versions that are affected are 6.1, 6.2, 6.3, 6.3.1 and  6.3.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Transportation Management.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0435</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1991V-6.1</ProductID>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-1991V-6.1</ProductID>
            <ProductID>P-1991V-6.2</ProductID>
            <ProductID>P-1991V-6.3</ProductID>
            <ProductID>P-1991V-6.3.1</ProductID>
            <ProductID>P-1991V-6.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="137" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0437</Title>
      <Notes>
         <Note Audience="All" Ordinal="137" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Optimizer).  Supported versions that are affected are 5.1.72 and earlier, 5.5.34 and earlier and  5.6.14 and earlier. Difficult to exploit vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 3.5 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0437</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.72 and earlier</ProductID>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-8478V-5.1.72 and earlier</ProductID>
            <ProductID>P-8478V-5.5.34 and earlier</ProductID>
            <ProductID>P-8478V-5.6.14 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="138" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0438</Title>
      <Notes>
         <Note Audience="All" Ordinal="138" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Panel Processor).  Supported versions that are affected are 8.52 and  8.53. Easily exploitable vulnerability allows successful authenticated network attacks via None.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0438</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="139" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0439</Title>
      <Notes>
         <Note Audience="All" Ordinal="139" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Report Distribution).  Supported versions that are affected are 8.52 and  8.53. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 4.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0439</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="140" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0440</Title>
      <Notes>
         <Note Audience="All" Ordinal="140" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology).  Supported versions that are affected are 8.52 and  8.53. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PeopleTools.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0440</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="141" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0441</Title>
      <Notes>
         <Note Audience="All" Ordinal="141" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker).  Supported versions that are affected are 8.52 and  8.53. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PeopleTools.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0441</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="142" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0443</Title>
      <Notes>
         <Note Audience="All" Ordinal="142" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Security).   The supported version that is affected is 8.52. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0443</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="143" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0444</Title>
      <Notes>
         <Note Audience="All" Ordinal="143" Title="Details" Type="Details">Vulnerability in the Oracle AutoVue component of Oracle Supply Chain Products Suite (subcomponent: Web General).   The supported version that is affected is 20.1.1. Difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle AutoVue accessible data.  CVSS Base Score 3.5 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0444</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4453V-20.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-4453V-20.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="144" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0445</Title>
      <Notes>
         <Note Audience="All" Ordinal="144" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology).  Supported versions that are affected are 8.52 and  8.53. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft Enterprise PeopleTools accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0445</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2014</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujan2014.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
            <ProductID>P-5085V-8.53</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
</cvrf:cvrfdoc>
