<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="2967710.xsl"?>
<?xml-stylesheet type="text/css" href="2967708.css"?>
<cvrf:cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
   <DocumentTitle xml:lang="en">Oracle Critical Patch Update Advisory - April 2023 - Oracle CVRF</DocumentTitle>
   <DocumentType xml:lang="en">Oracle Critical Patch Update Advisory</DocumentType>
   <DocumentPublisher Type="Vendor"/>
   <DocumentTracking>
      <Identification>
         <ID>CPUApr2023</ID>
      </Identification>
      <Status>Final</Status>
      <Version>2</Version>
      <RevisionHistory>
         <Revision>
            <Number>2</Number>
            <Date>2023-04-25T10:00:00-07:00</Date>
            <Description>Rev 2. Added Credit and Protocol for WebLogic</Description>
         </Revision>
      </RevisionHistory>
      <InitialReleaseDate>2023-04-18T13:00:00-07:00</InitialReleaseDate>
      <CurrentReleaseDate>2023-04-25T10:00:00-07:00</CurrentReleaseDate>
   </DocumentTracking>
   <DocumentNotes>
      <Note Audience="All" Ordinal="1" Title="Summary" Type="Summary" xml:lang="en">This document contains descriptions of Oracle product security vulnerabilities which have had security patches released for all supported versions and platforms for the associated product.  Additional information regarding these vulnerabilities including security patch distribution information can be found at the Oracle sites referenced in this document.</Note>
   </DocumentNotes>
   <DocumentDistribution>This document is published at: https://www.oracle.com/docs/tech/security-alerts/cpuapr2023cvrf.xml</DocumentDistribution>
   <DocumentReferences>
      <Reference Type="External">
         <URL>https://www.oracle.com/security-alerts/cpuapr2023.html</URL>
         <Description>URL to html version of Advisory</Description>
      </Reference>
   </DocumentReferences>
   <Acknowledgments>
      <Acknowledgment>
         <Name>Richard A. Chaaya (RAC)</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Adam Reziouk</Name>
         <Organization>Airbus Cyber Vulnerabilities Service</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Adam Willard</Name>
         <Organization>Adam Willard</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ahmed Ramzy</Name>
         <Organization>Ahmed Ramzy</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Alex Rubin</Name>
         <Organization>Amazon Web Services IT Security</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>AnhNH</Name>
         <Organization>Sacombank</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Aobo Wang of Chaitin Security Research Lab</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Arras Aniss</Name>
         <Organization>Arras Aniss</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>BeichenDream</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ben Smyth</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Bien Pham of Qrious Security working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>CSOC-FTEL</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>ChauUHM</Name>
         <Organization>Sacombank</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ayansh Sinha (CyberDad)</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dan Urson</Name>
         <Organization>Amazon Web Services IT Security</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ramki Ramakrishna of Amazon</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dema Alsaif</Name>
         <Organization>Dema Alsaif</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dinesh Kumar (dhina016)</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dungdm (piers2) of Viettel Cyber Security working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Emad Al-Mousa of Saudi Aramco</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Evgeny Astigeevich of Amazon Development Centre (London) Ltd</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>c0ny1 </Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Hannu Forsten</Name>
         <Organization>Hannu Forsten</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ivan Andres Valdivieso Castillo</Name>
         <Organization>Ivan Andres Valdivieso Castillo</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jaspreet Singh</Name>
         <Organization>Jaspreet Singh</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jean-Michel Huguet from NATO Cyber Security Centre (NCSC)</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jerome Nokin from NATO Cyber Security Centre (NCSC)</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jie Liang</Name>
         <Organization>WingTecher Lab of Tsinghua University</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jingzhou Fu</Name>
         <Organization>WingTecher Lab of Tsinghua University</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jonathan Looney of Netflix</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Khanh Nguyen</Name>
         <Organization>Khanh Nguyen</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Khanh Nguyen Duy Quoc</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Kieran Foley</Name>
         <Organization>Kieran Foley</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Krishna Chaitanya Velicheti</Name>
         <Organization>Krishna Chaitanya Velicheti</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Kun Yang of Chaitin Security Research Lab</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lai Han</Name>
         <Organization>Lai Han</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Liboheng of Tophant Starlight laboratory</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>thiscodecc of MoyunSec TopBreaker Labs and Bing of MoyunSec</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>P1ay2win of Qianxin Wuji Lab</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Linrong Cao of Noah-Lab of 360</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lu Yu of Chaitin Security Research Lab</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Luo Likang of NSFOCUS TIANJI Lab</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Martin Rakhmanov of Amazon Web Services IT Security</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Nguyen Binh Minh of CSOC-FTEL</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Nguyen Binh Yen of CSOC-FTEL</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Okeen Armua</Name>
         <Organization>Okeen Armua</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>PJ Fanning</Name>
         <Organization>PJ Fanning</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Philippe Antoine of Telecom Nancy</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Pim Dieleman of Cadran Consultancy B.V.</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>4ra1n of Chaitin Tech</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Qualcomm Cyber SOC</Name>
         <Organization>Qualcomm Cyber SOC</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Rens</Name>
         <Organization>Rsecure</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Roman Wagner</Name>
         <Organization>Code Intelligence</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sanket Sherkhane</Name>
         <Organization>Sanket Sherkhane</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Seth Duda of SquareWorks Consulting</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sharique Raza</Name>
         <Organization>Sharique Raza</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Shubham Shah, Sean Yeoh, Jason Haddix, Brendan Scarvell</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Thomas Bouzerar (MajorTomSec) from Synacktiv</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>TungHT</Name>
         <Organization>Sacombank</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>tr1ple (AntGroup FG)</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Wang Ke of Zhejiang University</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>0xrumbe, zd of ThreatBook Labs</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>X1r0z</Name>
         <Organization>X1r0z</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Y4tacker</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Yu Wang</Name>
         <Organization>BMH Security Team</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>aw0yo of Cyber KunLun</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Zhangyi Chen of Noah-Lab of 360</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Zhiyong Wu</Name>
         <Organization>WingTecher Lab of Tsinghua University</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Zu-Ming Jiang</Name>
         <Organization>Zu-Ming Jiang</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>bluE0</Name>
         <Organization>bluE0</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ishan Vyas</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>sw0rd1ight</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>ADLab of Venustech</Name>
         <Organization></Organization>
      </Acknowledgment>
   </Acknowledgments>
   <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
      <Branch Name="Oracle" Type="Vendor">
         <Branch Name="Oracle Analytics" Type="Product Family">
            <Branch Name="Oracle BI Publisher" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-12.2.1.4.0">Oracle BI Publisher Version 12.2.1.4.0</FullProductName>
               </Branch>
               <Branch Name="6.4.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-6.4.0.0.0">Oracle BI Publisher Version 6.4.0.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Business Intelligence Enterprise Edition" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-2025V-12.2.1.4.0">Oracle Business Intelligence Enterprise Edition Version 12.2.1.4.0</FullProductName>
               </Branch>
               <Branch Name="5.9.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-2025V-5.9.0.0.0">Oracle Business Intelligence Enterprise Edition Version 5.9.0.0.0</FullProductName>
               </Branch>
               <Branch Name="6.4.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-2025V-6.4.0.0.0">Oracle Business Intelligence Enterprise Edition Version 6.4.0.0.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Big Data Spatial and Graph" Type="Product Family">
            <Branch Name="Oracle Big Data Spatial and Graph" Type="Product Name">
               <Branch Name="Prior to 23.1" Type="Product Version">
                  <FullProductName ProductID="P-11528V-Prior to 23.1">Oracle Big Data Spatial and Graph Version Prior to 23.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Blockchain Platform" Type="Product Family">
            <Branch Name="Oracle Blockchain Platform" Type="Product Name">
               <Branch Name="Prior to 21.1.3" Type="Product Version">
                  <FullProductName ProductID="P-13444V-Prior to 21.1.3">Oracle Blockchain Platform Version Prior to 21.1.3</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Commerce" Type="Product Family">
            <Branch Name="Oracle Commerce Guided Search" Type="Product Name">
               <Branch Name="11.3.2" Type="Product Version">
                  <FullProductName ProductID="P-9633V-11.3.2">Oracle Commerce Guided Search Version 11.3.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Commerce Platform" Type="Product Name">
               <Branch Name="11.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9348V-11.3.0">Oracle Commerce Platform Version 11.3.0</FullProductName>
               </Branch>
               <Branch Name="11.3.1" Type="Product Version">
                  <FullProductName ProductID="P-9348V-11.3.1">Oracle Commerce Platform Version 11.3.1</FullProductName>
               </Branch>
               <Branch Name="11.3.2" Type="Product Version">
                  <FullProductName ProductID="P-9348V-11.3.2">Oracle Commerce Platform Version 11.3.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Communications" Type="Product Family">
            <Branch Name="Management Cloud Engine" Type="Product Name">
               <Branch Name="22.1.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-14252V-22.1.0.0.0">Management Cloud Engine Version 22.1.0.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Configuration Console" Type="Product Name">
               <Branch Name="22.4.1" Type="Product Version">
                  <FullProductName ProductID="P-14250V-22.4.1">Oracle Communications Cloud Native Configuration Console Version 22.4.1</FullProductName>
               </Branch>
               <Branch Name="23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-14250V-23.1.0">Oracle Communications Cloud Native Configuration Console Version 23.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Automated Test Suite" Type="Product Name">
               <Branch Name="22.3.1" Type="Product Version">
                  <FullProductName ProductID="P-14488V-22.3.1">Oracle Communications Cloud Native Core Automated Test Suite Version 22.3.1</FullProductName>
               </Branch>
               <Branch Name="22.4.0" Type="Product Version">
                  <FullProductName ProductID="P-14488V-22.4.0">Oracle Communications Cloud Native Core Automated Test Suite Version 22.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Binding Support Function" Type="Product Name">
               <Branch Name="22.4.0-22.4.4" Type="Product Version">
                  <FullProductName ProductID="P-14121V-22.4.0-22.4.4">Oracle Communications Cloud Native Core Binding Support Function Version 22.4.0-22.4.4</FullProductName>
               </Branch>
               <Branch Name="23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-14121V-23.1.0">Oracle Communications Cloud Native Core Binding Support Function Version 23.1.0</FullProductName>
               </Branch>
               <Branch Name="23.1.0-23.1.1" Type="Product Version">
                  <FullProductName ProductID="P-14121V-23.1.0-23.1.1">Oracle Communications Cloud Native Core Binding Support Function Version 23.1.0-23.1.1</FullProductName>
               </Branch>
               <Branch Name="23.1.1" Type="Product Version">
                  <FullProductName ProductID="P-14121V-23.1.1">Oracle Communications Cloud Native Core Binding Support Function Version 23.1.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Console" Type="Product Name">
               <Branch Name="22.3.0" Type="Product Version">
                  <FullProductName ProductID="P-14250V-22.3.0">Oracle Communications Cloud Native Core Console Version 22.3.0</FullProductName>
               </Branch>
               <Branch Name="22.4.0" Type="Product Version">
                  <FullProductName ProductID="P-14250V-22.4.0">Oracle Communications Cloud Native Core Console Version 22.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Network Exposure Function" Type="Product Name">
               <Branch Name="22.4.2" Type="Product Version">
                  <FullProductName ProductID="P-14122V-22.4.2">Oracle Communications Cloud Native Core Network Exposure Function Version 22.4.2</FullProductName>
               </Branch>
               <Branch Name="23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-14122V-23.1.0">Oracle Communications Cloud Native Core Network Exposure Function Version 23.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Network Function Cloud Native Environment" Type="Product Name">
               <Branch Name="22.4.0" Type="Product Version">
                  <FullProductName ProductID="P-14125V-22.4.0">Oracle Communications Cloud Native Core Network Function Cloud Native Environment Version 22.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Network Repository Function" Type="Product Name">
               <Branch Name="23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-14118V-23.1.0">Oracle Communications Cloud Native Core Network Repository Function Version 23.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Policy" Type="Product Name">
               <Branch Name="22.4.0-22.4.4" Type="Product Version">
                  <FullProductName ProductID="P-14277V-22.4.0-22.4.4">Oracle Communications Cloud Native Core Policy Version 22.4.0-22.4.4</FullProductName>
               </Branch>
               <Branch Name="23.1.0-23.1.1" Type="Product Version">
                  <FullProductName ProductID="P-14277V-23.1.0-23.1.1">Oracle Communications Cloud Native Core Policy Version 23.1.0-23.1.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Security Edge Protection Proxy" Type="Product Name">
               <Branch Name="22.4.0" Type="Product Version">
                  <FullProductName ProductID="P-14123V-22.4.0">Oracle Communications Cloud Native Core Security Edge Protection Proxy Version 22.4.0</FullProductName>
               </Branch>
               <Branch Name="22.4.1" Type="Product Version">
                  <FullProductName ProductID="P-14123V-22.4.1">Oracle Communications Cloud Native Core Security Edge Protection Proxy Version 22.4.1</FullProductName>
               </Branch>
               <Branch Name="22.4.2" Type="Product Version">
                  <FullProductName ProductID="P-14123V-22.4.2">Oracle Communications Cloud Native Core Security Edge Protection Proxy Version 22.4.2</FullProductName>
               </Branch>
               <Branch Name="23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-14123V-23.1.0">Oracle Communications Cloud Native Core Security Edge Protection Proxy Version 23.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Service Communication Proxy" Type="Product Name">
               <Branch Name="22.3.0" Type="Product Version">
                  <FullProductName ProductID="P-14117V-22.3.0">Oracle Communications Cloud Native Core Service Communication Proxy Version 22.3.0</FullProductName>
               </Branch>
               <Branch Name="22.4.0" Type="Product Version">
                  <FullProductName ProductID="P-14117V-22.4.0">Oracle Communications Cloud Native Core Service Communication Proxy Version 22.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Cloud Native Core Unified Data Repository" Type="Product Name">
               <Branch Name="22.4.1" Type="Product Version">
                  <FullProductName ProductID="P-14119V-22.4.1">Oracle Communications Cloud Native Core Unified Data Repository Version 22.4.1</FullProductName>
               </Branch>
               <Branch Name="23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-14119V-23.1.0">Oracle Communications Cloud Native Core Unified Data Repository Version 23.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Core Session Manager" Type="Product Name">
               <Branch Name="8.45" Type="Product Version">
                  <FullProductName ProductID="P-10754V-8.45">Oracle Communications Core Session Manager Version 8.45</FullProductName>
               </Branch>
               <Branch Name="9.15" Type="Product Version">
                  <FullProductName ProductID="P-10754V-9.15">Oracle Communications Core Session Manager Version 9.15</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Diameter Signaling Router" Type="Product Name">
               <Branch Name="8.6.0.0" Type="Product Version">
                  <FullProductName ProductID="P-10899V-8.6.0.0">Oracle Communications Diameter Signaling Router Version 8.6.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Element Manager" Type="Product Name">
               <Branch Name="9.0.0" Type="Product Version">
                  <FullProductName ProductID="P-11052V-9.0.0">Oracle Communications Element Manager Version 9.0.0</FullProductName>
               </Branch>
               <Branch Name="9.0.1" Type="Product Version">
                  <FullProductName ProductID="P-11052V-9.0.1">Oracle Communications Element Manager Version 9.0.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Operations Monitor" Type="Product Name">
               <Branch Name="5.0" Type="Product Version">
                  <FullProductName ProductID="P-10761V-5.0">Oracle Communications Operations Monitor Version 5.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Policy Management" Type="Product Name">
               <Branch Name="12.6.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-10900V-12.6.0.0.0">Oracle Communications Policy Management Version 12.6.0.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Services Gatekeeper" Type="Product Name">
               <Branch Name="7.0.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5381V-7.0.0.0.0">Oracle Communications Services Gatekeeper Version 7.0.0.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Session Border Controller" Type="Product Name">
               <Branch Name="9.0" Type="Product Version">
                  <FullProductName ProductID="P-10750V-9.0">Oracle Communications Session Border Controller Version 9.0</FullProductName>
               </Branch>
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-10750V-9.1">Oracle Communications Session Border Controller Version 9.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Session Report Manager" Type="Product Name">
               <Branch Name="9.0.0" Type="Product Version">
                  <FullProductName ProductID="P-10770V-9.0.0">Oracle Communications Session Report Manager Version 9.0.0</FullProductName>
               </Branch>
               <Branch Name="9.0.1" Type="Product Version">
                  <FullProductName ProductID="P-10770V-9.0.1">Oracle Communications Session Report Manager Version 9.0.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Session Router" Type="Product Name">
               <Branch Name="9.0" Type="Product Version">
                  <FullProductName ProductID="P-10752V-9.0">Oracle Communications Session Router Version 9.0</FullProductName>
               </Branch>
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-10752V-9.1">Oracle Communications Session Router Version 9.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Subscriber-Aware Load Balancer" Type="Product Name">
               <Branch Name="9.0" Type="Product Version">
                  <FullProductName ProductID="P-10766V-9.0">Oracle Communications Subscriber-Aware Load Balancer Version 9.0</FullProductName>
               </Branch>
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-10766V-9.1">Oracle Communications Subscriber-Aware Load Balancer Version 9.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications User Data Repository" Type="Product Name">
               <Branch Name="12.6.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-11108V-12.6.1.0.0">Oracle Communications User Data Repository Version 12.6.1.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Enterprise Communications Broker" Type="Product Name">
               <Branch Name="3.3" Type="Product Version">
                  <FullProductName ProductID="P-10758V-3.3">Oracle Enterprise Communications Broker Version 3.3</FullProductName>
               </Branch>
               <Branch Name="4.0" Type="Product Version">
                  <FullProductName ProductID="P-10758V-4.0">Oracle Enterprise Communications Broker Version 4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Enterprise Session Router" Type="Product Name">
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-14615V-9.1">Oracle Enterprise Session Router Version 9.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle SD-WAN Aware" Type="Product Name">
               <Branch Name="9.0.1.6.0" Type="Product Version">
                  <FullProductName ProductID="P-13941V-9.0.1.6.0">Oracle SD-WAN Aware Version 9.0.1.6.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle SD-WAN Edge" Type="Product Name">
               <Branch Name="9.1.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-13940V-9.1.1.3.0">Oracle SD-WAN Edge Version 9.1.1.3.0</FullProductName>
               </Branch>
               <Branch Name="9.1.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-13940V-9.1.1.4.0">Oracle SD-WAN Edge Version 9.1.1.4.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Communications Applications" Type="Product Family">
            <Branch Name="Oracle Communications Convergent Charging Controller" Type="Product Name">
               <Branch Name="12.0.1.0.0-12.0.6.0.0" Type="Product Version">
                  <FullProductName ProductID="P-12985V-12.0.1.0.0-12.0.6.0.0">Oracle Communications Convergent Charging Controller Version 12.0.1.0.0-12.0.6.0.0</FullProductName>
               </Branch>
               <Branch Name="12.0.4-12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-12985V-12.0.4-12.0.6">Oracle Communications Convergent Charging Controller Version 12.0.4-12.0.6</FullProductName>
               </Branch>
               <Branch Name="6.0.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-12985V-6.0.1.0.0">Oracle Communications Convergent Charging Controller Version 6.0.1.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications IP Service Activator" Type="Product Name">
               <Branch Name="7.4.0" Type="Product Version">
                  <FullProductName ProductID="P-2261V-7.4.0">Oracle Communications IP Service Activator Version 7.4.0</FullProductName>
               </Branch>
               <Branch Name="7.5.0" Type="Product Version">
                  <FullProductName ProductID="P-2261V-7.5.0">Oracle Communications IP Service Activator Version 7.5.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Network Charging and Control" Type="Product Name">
               <Branch Name="12.0.1.0.0-12.0.6.0.0" Type="Product Version">
                  <FullProductName ProductID="P-4623V-12.0.1.0.0-12.0.6.0.0">Oracle Communications Network Charging and Control Version 12.0.1.0.0-12.0.6.0.0</FullProductName>
               </Branch>
               <Branch Name="12.0.4-12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-4623V-12.0.4-12.0.6">Oracle Communications Network Charging and Control Version 12.0.4-12.0.6</FullProductName>
               </Branch>
               <Branch Name="6.0.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-4623V-6.0.1.0.0">Oracle Communications Network Charging and Control Version 6.0.1.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Order and Service Management" Type="Product Name">
               <Branch Name="7.4.1" Type="Product Version">
                  <FullProductName ProductID="P-2270V-7.4.1">Oracle Communications Order and Service Management Version 7.4.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Unified Assurance" Type="Product Name">
               <Branch Name="5.5.0-5.5.10" Type="Product Version">
                  <FullProductName ProductID="P-14597V-5.5.0-5.5.10">Oracle Communications Unified Assurance Version 5.5.0-5.5.10</FullProductName>
               </Branch>
               <Branch Name="5.5.0-5.5.9" Type="Product Version">
                  <FullProductName ProductID="P-14597V-5.5.0-5.5.9">Oracle Communications Unified Assurance Version 5.5.0-5.5.9</FullProductName>
               </Branch>
               <Branch Name="6.0.0-6.0.1" Type="Product Version">
                  <FullProductName ProductID="P-14597V-6.0.0-6.0.1">Oracle Communications Unified Assurance Version 6.0.0-6.0.1</FullProductName>
               </Branch>
               <Branch Name="6.0.0-6.0.2" Type="Product Version">
                  <FullProductName ProductID="P-14597V-6.0.0-6.0.2">Oracle Communications Unified Assurance Version 6.0.0-6.0.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Communications Unified Inventory Management" Type="Product Name">
               <Branch Name="7.4.0" Type="Product Version">
                  <FullProductName ProductID="P-4516V-7.4.0">Oracle Communications Unified Inventory Management Version 7.4.0</FullProductName>
               </Branch>
               <Branch Name="7.4.1" Type="Product Version">
                  <FullProductName ProductID="P-4516V-7.4.1">Oracle Communications Unified Inventory Management Version 7.4.1</FullProductName>
               </Branch>
               <Branch Name="7.4.2" Type="Product Version">
                  <FullProductName ProductID="P-4516V-7.4.2">Oracle Communications Unified Inventory Management Version 7.4.2</FullProductName>
               </Branch>
               <Branch Name="7.5.0" Type="Product Version">
                  <FullProductName ProductID="P-4516V-7.5.0">Oracle Communications Unified Inventory Management Version 7.5.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Construction and Engineering" Type="Product Family">
            <Branch Name="Primavera P6 Enterprise Project Portfolio Management" Type="Product Name">
               <Branch Name="18.8.0-18.8.26" Type="Product Version">
                  <FullProductName ProductID="P-5579V-18.8.0-18.8.26">Primavera P6 Enterprise Project Portfolio Management Version 18.8.0-18.8.26</FullProductName>
               </Branch>
               <Branch Name="19.12.0-19.12.21" Type="Product Version">
                  <FullProductName ProductID="P-5579V-19.12.0-19.12.21">Primavera P6 Enterprise Project Portfolio Management Version 19.12.0-19.12.21</FullProductName>
               </Branch>
               <Branch Name="20.12.0-20.12.18" Type="Product Version">
                  <FullProductName ProductID="P-5579V-20.12.0-20.12.18">Primavera P6 Enterprise Project Portfolio Management Version 20.12.0-20.12.18</FullProductName>
               </Branch>
               <Branch Name="21.12.0-21.12.12" Type="Product Version">
                  <FullProductName ProductID="P-5579V-21.12.0-21.12.12">Primavera P6 Enterprise Project Portfolio Management Version 21.12.0-21.12.12</FullProductName>
               </Branch>
               <Branch Name="22.12.0-22.12.3" Type="Product Version">
                  <FullProductName ProductID="P-5579V-22.12.0-22.12.3">Primavera P6 Enterprise Project Portfolio Management Version 22.12.0-22.12.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Primavera Unifier" Type="Product Name">
               <Branch Name="18.8.0-18.8.18" Type="Product Version">
                  <FullProductName ProductID="P-10354V-18.8.0-18.8.18">Primavera Unifier Version 18.8.0-18.8.18</FullProductName>
               </Branch>
               <Branch Name="19.12.0-19.12.16" Type="Product Version">
                  <FullProductName ProductID="P-10354V-19.12.0-19.12.16">Primavera Unifier Version 19.12.0-19.12.16</FullProductName>
               </Branch>
               <Branch Name="20.12.0-20.12.16" Type="Product Version">
                  <FullProductName ProductID="P-10354V-20.12.0-20.12.16">Primavera Unifier Version 20.12.0-20.12.16</FullProductName>
               </Branch>
               <Branch Name="21.12.0-21.12.14" Type="Product Version">
                  <FullProductName ProductID="P-10354V-21.12.0-21.12.14">Primavera Unifier Version 21.12.0-21.12.14</FullProductName>
               </Branch>
               <Branch Name="22.12.0-22.12.3" Type="Product Version">
                  <FullProductName ProductID="P-10354V-22.12.0-22.12.3">Primavera Unifier Version 22.12.0-22.12.3</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Database Server" Type="Product Family">
            <Branch Name="Oracle Database Server" Type="Product Name">
               <Branch Name="19c" Type="Product Version">
                  <FullProductName ProductID="P-5(Java VM)V-19c">Oracle Database Server(Java VM) Version 19c</FullProductName>
               </Branch>
               <Branch Name="19c" Type="Product Version">
                  <FullProductName ProductID="P-5(Oracle Database Recovery Manager)V-19c">Oracle Database Server(Oracle Database Recovery Manager) Version 19c</FullProductName>
               </Branch>
               <Branch Name="19c" Type="Product Version">
                  <FullProductName ProductID="P-5(Oracle Database)V-19c">Oracle Database Server(Oracle Database) Version 19c</FullProductName>
               </Branch>
               <Branch Name="21c" Type="Product Version">
                  <FullProductName ProductID="P-5(Java VM)V-21c">Oracle Database Server(Java VM) Version 21c</FullProductName>
               </Branch>
               <Branch Name="21c" Type="Product Version">
                  <FullProductName ProductID="P-5(Oracle Database OML4PY)V-21c">Oracle Database Server(Oracle Database OML4PY) Version 21c</FullProductName>
               </Branch>
               <Branch Name="21c" Type="Product Version">
                  <FullProductName ProductID="P-5(Oracle Database Recovery Manager)V-21c">Oracle Database Server(Oracle Database Recovery Manager) Version 21c</FullProductName>
               </Branch>
               <Branch Name="21c" Type="Product Version">
                  <FullProductName ProductID="P-5(Oracle Database Workload Manager)V-21c">Oracle Database Server(Oracle Database Workload Manager) Version 21c</FullProductName>
               </Branch>
               <Branch Name="21c" Type="Product Version">
                  <FullProductName ProductID="P-5(Oracle Database)V-21c">Oracle Database Server(Oracle Database) Version 21c</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle SQLcl" Type="Product Name">
               <Branch Name="21c" Type="Product Version">
                  <FullProductName ProductID="P-13824V-21c">Oracle SQLcl Version 21c</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Spatial and Graph" Type="Product Name">
               <Branch Name="19c" Type="Product Version">
                  <FullProductName ProductID="P-619V-19c">Spatial and Graph Version 19c</FullProductName>
               </Branch>
               <Branch Name="21c" Type="Product Version">
                  <FullProductName ProductID="P-619V-21c">Spatial and Graph Version 21c</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle E-Business Suite" Type="Product Family">
            <Branch Name="Oracle Application Object Library" Type="Product Name">
               <Branch Name="12.2.3-12.2.11" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.2.3-12.2.11">Oracle Application Object Library Version 12.2.3-12.2.11</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle User Management" Type="Product Name">
               <Branch Name="12.2.3-12.2.12" Type="Product Version">
                  <FullProductName ProductID="P-1475V-12.2.3-12.2.12">Oracle User Management Version 12.2.3-12.2.12</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle iProcurement" Type="Product Name">
               <Branch Name="12.2.3-12.2.12" Type="Product Version">
                  <FullProductName ProductID="P-398V-12.2.3-12.2.12">Oracle iProcurement Version 12.2.3-12.2.12</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle iReceivables" Type="Product Name">
               <Branch Name="12.2.3-12.2.12" Type="Product Version">
                  <FullProductName ProductID="P-1106V-12.2.3-12.2.12">Oracle iReceivables Version 12.2.3-12.2.12</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Enterprise Manager" Type="Product Family">
            <Branch Name="Oracle Application Testing Suite" Type="Product Name">
               <Branch Name="13.3.0.1" Type="Product Version">
                  <FullProductName ProductID="P-4622V-13.3.0.1">Oracle Application Testing Suite Version 13.3.0.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Enterprise Manager Ops Center" Type="Product Name">
               <Branch Name="12.4.0.0" Type="Product Version">
                  <FullProductName ProductID="P-9835V-12.4.0.0">Oracle Enterprise Manager Ops Center Version 12.4.0.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Essbase" Type="Product Family">
            <Branch Name="Oracle Essbase" Type="Product Name">
               <Branch Name="21.4" Type="Product Version">
                  <FullProductName ProductID="P-4379V-21.4">Oracle Essbase Version 21.4</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Financial Services Applications" Type="Product Family">
            <Branch Name="Oracle Banking APIs" Type="Product Name">
               <Branch Name="18.2" Type="Product Version">
                  <FullProductName ProductID="P-13676V-18.2">Oracle Banking APIs Version 18.2</FullProductName>
               </Branch>
               <Branch Name="18.3" Type="Product Version">
                  <FullProductName ProductID="P-13676V-18.3">Oracle Banking APIs Version 18.3</FullProductName>
               </Branch>
               <Branch Name="19.1" Type="Product Version">
                  <FullProductName ProductID="P-13676V-19.1">Oracle Banking APIs Version 19.1</FullProductName>
               </Branch>
               <Branch Name="19.2" Type="Product Version">
                  <FullProductName ProductID="P-13676V-19.2">Oracle Banking APIs Version 19.2</FullProductName>
               </Branch>
               <Branch Name="21.1" Type="Product Version">
                  <FullProductName ProductID="P-13676V-21.1">Oracle Banking APIs Version 21.1</FullProductName>
               </Branch>
               <Branch Name="22.1" Type="Product Version">
                  <FullProductName ProductID="P-13676V-22.1">Oracle Banking APIs Version 22.1</FullProductName>
               </Branch>
               <Branch Name="22.2" Type="Product Version">
                  <FullProductName ProductID="P-13676V-22.2">Oracle Banking APIs Version 22.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Banking Corporate Lending" Type="Product Name">
               <Branch Name="14.0-14.3" Type="Product Version">
                  <FullProductName ProductID="P-12989V-14.0-14.3">Oracle Banking Corporate Lending Version 14.0-14.3</FullProductName>
               </Branch>
               <Branch Name="14.5-14.7" Type="Product Version">
                  <FullProductName ProductID="P-12989V-14.5-14.7">Oracle Banking Corporate Lending Version 14.5-14.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Banking Corporate Lending Process Management" Type="Product Name">
               <Branch Name="14.4-14.7" Type="Product Version">
                  <FullProductName ProductID="P-13701V-14.4-14.7">Oracle Banking Corporate Lending Process Management Version 14.4-14.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Banking Digital Experience" Type="Product Name">
               <Branch Name="18.2" Type="Product Version">
                  <FullProductName ProductID="P-12605V-18.2">Oracle Banking Digital Experience Version 18.2</FullProductName>
               </Branch>
               <Branch Name="18.3" Type="Product Version">
                  <FullProductName ProductID="P-12605V-18.3">Oracle Banking Digital Experience Version 18.3</FullProductName>
               </Branch>
               <Branch Name="19.1" Type="Product Version">
                  <FullProductName ProductID="P-12605V-19.1">Oracle Banking Digital Experience Version 19.1</FullProductName>
               </Branch>
               <Branch Name="19.2" Type="Product Version">
                  <FullProductName ProductID="P-12605V-19.2">Oracle Banking Digital Experience Version 19.2</FullProductName>
               </Branch>
               <Branch Name="21.1" Type="Product Version">
                  <FullProductName ProductID="P-12605V-21.1">Oracle Banking Digital Experience Version 21.1</FullProductName>
               </Branch>
               <Branch Name="22.1" Type="Product Version">
                  <FullProductName ProductID="P-12605V-22.1">Oracle Banking Digital Experience Version 22.1</FullProductName>
               </Branch>
               <Branch Name="22.2" Type="Product Version">
                  <FullProductName ProductID="P-12605V-22.2">Oracle Banking Digital Experience Version 22.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Banking Payments" Type="Product Name">
               <Branch Name="14.5" Type="Product Version">
                  <FullProductName ProductID="P-13011V-14.5">Oracle Banking Payments Version 14.5</FullProductName>
               </Branch>
               <Branch Name="14.6" Type="Product Version">
                  <FullProductName ProductID="P-13011V-14.6">Oracle Banking Payments Version 14.6</FullProductName>
               </Branch>
               <Branch Name="14.7" Type="Product Version">
                  <FullProductName ProductID="P-13011V-14.7">Oracle Banking Payments Version 14.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Banking Trade Finance" Type="Product Name">
               <Branch Name="14.5" Type="Product Version">
                  <FullProductName ProductID="P-14134V-14.5">Oracle Banking Trade Finance Version 14.5</FullProductName>
               </Branch>
               <Branch Name="14.6" Type="Product Version">
                  <FullProductName ProductID="P-14134V-14.6">Oracle Banking Trade Finance Version 14.6</FullProductName>
               </Branch>
               <Branch Name="14.7" Type="Product Version">
                  <FullProductName ProductID="P-14134V-14.7">Oracle Banking Trade Finance Version 14.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Banking Treasury Management" Type="Product Name">
               <Branch Name="14.5" Type="Product Version">
                  <FullProductName ProductID="P-14133V-14.5">Oracle Banking Treasury Management Version 14.5</FullProductName>
               </Branch>
               <Branch Name="14.6" Type="Product Version">
                  <FullProductName ProductID="P-14133V-14.6">Oracle Banking Treasury Management Version 14.6</FullProductName>
               </Branch>
               <Branch Name="14.7" Type="Product Version">
                  <FullProductName ProductID="P-14133V-14.7">Oracle Banking Treasury Management Version 14.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Banking Virtual Account Management" Type="Product Name">
               <Branch Name="14.5" Type="Product Version">
                  <FullProductName ProductID="P-13487V-14.5">Oracle Banking Virtual Account Management Version 14.5</FullProductName>
               </Branch>
               <Branch Name="14.6" Type="Product Version">
                  <FullProductName ProductID="P-13487V-14.6">Oracle Banking Virtual Account Management Version 14.6</FullProductName>
               </Branch>
               <Branch Name="14.7" Type="Product Version">
                  <FullProductName ProductID="P-13487V-14.7">Oracle Banking Virtual Account Management Version 14.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle FLEXCUBE Core Banking" Type="Product Name">
               <Branch Name="11.10" Type="Product Version">
                  <FullProductName ProductID="P-9101V-11.10">Oracle FLEXCUBE Core Banking Version 11.10</FullProductName>
               </Branch>
               <Branch Name="11.11" Type="Product Version">
                  <FullProductName ProductID="P-9101V-11.11">Oracle FLEXCUBE Core Banking Version 11.11</FullProductName>
               </Branch>
               <Branch Name="11.6" Type="Product Version">
                  <FullProductName ProductID="P-9101V-11.6">Oracle FLEXCUBE Core Banking Version 11.6</FullProductName>
               </Branch>
               <Branch Name="11.7" Type="Product Version">
                  <FullProductName ProductID="P-9101V-11.7">Oracle FLEXCUBE Core Banking Version 11.7</FullProductName>
               </Branch>
               <Branch Name="11.8" Type="Product Version">
                  <FullProductName ProductID="P-9101V-11.8">Oracle FLEXCUBE Core Banking Version 11.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle FLEXCUBE Universal Banking" Type="Product Name">
               <Branch Name="14.0-14.3" Type="Product Version">
                  <FullProductName ProductID="P-9052V-14.0-14.3">Oracle FLEXCUBE Universal Banking Version 14.0-14.3</FullProductName>
               </Branch>
               <Branch Name="14.5-14.7" Type="Product Version">
                  <FullProductName ProductID="P-9052V-14.5-14.7">Oracle FLEXCUBE Universal Banking Version 14.5-14.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Analytical Applications Infrastructure" Type="Product Name">
               <Branch Name="8.0.7.0" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.0.7.0">Oracle Financial Services Analytical Applications Infrastructure Version 8.0.7.0</FullProductName>
               </Branch>
               <Branch Name="8.0.8.0" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.0.8.0">Oracle Financial Services Analytical Applications Infrastructure Version 8.0.8.0</FullProductName>
               </Branch>
               <Branch Name="8.0.9.0" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.0.9.0">Oracle Financial Services Analytical Applications Infrastructure Version 8.0.9.0</FullProductName>
               </Branch>
               <Branch Name="8.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.1.0.0">Oracle Financial Services Analytical Applications Infrastructure Version 8.1.0.0</FullProductName>
               </Branch>
               <Branch Name="8.1.1.0" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.1.1.0">Oracle Financial Services Analytical Applications Infrastructure Version 8.1.1.0</FullProductName>
               </Branch>
               <Branch Name="8.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.1.2.0">Oracle Financial Services Analytical Applications Infrastructure Version 8.1.2.0</FullProductName>
               </Branch>
               <Branch Name="8.1.2.1" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.1.2.1">Oracle Financial Services Analytical Applications Infrastructure Version 8.1.2.1</FullProductName>
               </Branch>
               <Branch Name="8.1.2.2" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.1.2.2">Oracle Financial Services Analytical Applications Infrastructure Version 8.1.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Analytical Applications Reconciliation Framework" Type="Product Name">
               <Branch Name="8.0.7.1.2" Type="Product Version">
                  <FullProductName ProductID="P-5748V-8.0.7.1.2">Oracle Financial Services Analytical Applications Reconciliation Framework Version 8.0.7.1.2</FullProductName>
               </Branch>
               <Branch Name="8.1.1.1.7" Type="Product Version">
                  <FullProductName ProductID="P-5748V-8.1.1.1.7">Oracle Financial Services Analytical Applications Reconciliation Framework Version 8.1.1.1.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Asset Liability Management" Type="Product Name">
               <Branch Name="8.0.7.8.0" Type="Product Version">
                  <FullProductName ProductID="P-5662V-8.0.7.8.0">Oracle Financial Services Asset Liability Management Version 8.0.7.8.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Balance Computation Engine" Type="Product Name">
               <Branch Name="8.1.1.1.1" Type="Product Version">
                  <FullProductName ProductID="P-14246V-8.1.1.1.1">Oracle Financial Services Balance Computation Engine Version 8.1.1.1.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Balance Sheet Planning" Type="Product Name">
               <Branch Name="8.0.8.1.4" Type="Product Version">
                  <FullProductName ProductID="P-5663V-8.0.8.1.4">Oracle Financial Services Balance Sheet Planning Version 8.0.8.1.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Behavior Detection Platform" Type="Product Name">
               <Branch Name="8.0.8.1" Type="Product Version">
                  <FullProductName ProductID="P-9190V-8.0.8.1">Oracle Financial Services Behavior Detection Platform Version 8.0.8.1</FullProductName>
               </Branch>
               <Branch Name="8.1.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9190V-8.1.1.1">Oracle Financial Services Behavior Detection Platform Version 8.1.1.1</FullProductName>
               </Branch>
               <Branch Name="8.1.2.3" Type="Product Version">
                  <FullProductName ProductID="P-9190V-8.1.2.3">Oracle Financial Services Behavior Detection Platform Version 8.1.2.3</FullProductName>
               </Branch>
               <Branch Name="8.1.2.4" Type="Product Version">
                  <FullProductName ProductID="P-9190V-8.1.2.4">Oracle Financial Services Behavior Detection Platform Version 8.1.2.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Compliance Studio" Type="Product Name">
               <Branch Name="8.1.2.4" Type="Product Version">
                  <FullProductName ProductID="P-14392V-8.1.2.4">Oracle Financial Services Compliance Studio Version 8.1.2.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Crime and Compliance Management Studio" Type="Product Name">
               <Branch Name="8.0.8.3.5" Type="Product Version">
                  <FullProductName ProductID="P-13595V-8.0.8.3.5">Oracle Financial Services Crime and Compliance Management Studio Version 8.0.8.3.5</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Currency Transaction Reporting" Type="Product Name">
               <Branch Name="8.0.8.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9784V-8.0.8.1.0">Oracle Financial Services Currency Transaction Reporting Version 8.0.8.1.0</FullProductName>
               </Branch>
               <Branch Name="8.1.1.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9784V-8.1.1.1.0">Oracle Financial Services Currency Transaction Reporting Version 8.1.1.1.0</FullProductName>
               </Branch>
               <Branch Name="8.1.2.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9784V-8.1.2.3.0">Oracle Financial Services Currency Transaction Reporting Version 8.1.2.3.0</FullProductName>
               </Branch>
               <Branch Name="8.1.2.4.1" Type="Product Version">
                  <FullProductName ProductID="P-9784V-8.1.2.4.1">Oracle Financial Services Currency Transaction Reporting Version 8.1.2.4.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Data Governance for US Regulatory Reporting" Type="Product Name">
               <Branch Name="8.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-11669V-8.1.2.0">Oracle Financial Services Data Governance for US Regulatory Reporting Version 8.1.2.0</FullProductName>
               </Branch>
               <Branch Name="8.1.2.1" Type="Product Version">
                  <FullProductName ProductID="P-11669V-8.1.2.1">Oracle Financial Services Data Governance for US Regulatory Reporting Version 8.1.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Data Integration Hub" Type="Product Name">
               <Branch Name="8.0.7.3.1" Type="Product Version">
                  <FullProductName ProductID="P-11289V-8.0.7.3.1">Oracle Financial Services Data Integration Hub Version 8.0.7.3.1</FullProductName>
               </Branch>
               <Branch Name="8.1.0.1.4" Type="Product Version">
                  <FullProductName ProductID="P-11289V-8.1.0.1.4">Oracle Financial Services Data Integration Hub Version 8.1.0.1.4</FullProductName>
               </Branch>
               <Branch Name="8.1.2.2.1" Type="Product Version">
                  <FullProductName ProductID="P-11289V-8.1.2.2.1">Oracle Financial Services Data Integration Hub Version 8.1.2.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management" Type="Product Name">
               <Branch Name="8.0.7.3.1" Type="Product Version">
                  <FullProductName ProductID="P-13802V-8.0.7.3.1">Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management Version 8.0.7.3.1</FullProductName>
               </Branch>
               <Branch Name="8.0.8.3.1" Type="Product Version">
                  <FullProductName ProductID="P-13802V-8.0.8.3.1">Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management Version 8.0.8.3.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Enterprise Case Management" Type="Product Name">
               <Branch Name="8.0.8.2" Type="Product Version">
                  <FullProductName ProductID="P-13545V-8.0.8.2">Oracle Financial Services Enterprise Case Management Version 8.0.8.2</FullProductName>
               </Branch>
               <Branch Name="8.1.1.1" Type="Product Version">
                  <FullProductName ProductID="P-13545V-8.1.1.1">Oracle Financial Services Enterprise Case Management Version 8.1.1.1</FullProductName>
               </Branch>
               <Branch Name="8.1.2.3" Type="Product Version">
                  <FullProductName ProductID="P-13545V-8.1.2.3">Oracle Financial Services Enterprise Case Management Version 8.1.2.3</FullProductName>
               </Branch>
               <Branch Name="8.1.2.4" Type="Product Version">
                  <FullProductName ProductID="P-13545V-8.1.2.4">Oracle Financial Services Enterprise Case Management Version 8.1.2.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Enterprise Financial Performance Analytics" Type="Product Name">
               <Branch Name="8.0.7.8.1" Type="Product Version">
                  <FullProductName ProductID="P-4279V-8.0.7.8.1">Oracle Financial Services Enterprise Financial Performance Analytics Version 8.0.7.8.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Funds Transfer Pricing" Type="Product Name">
               <Branch Name="8.0.7.8.1" Type="Product Version">
                  <FullProductName ProductID="P-5659V-8.0.7.8.1">Oracle Financial Services Funds Transfer Pricing Version 8.0.7.8.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Institutional Performance Analytics" Type="Product Name">
               <Branch Name="8.0.7.8.1" Type="Product Version">
                  <FullProductName ProductID="P-10215V-8.0.7.8.1">Oracle Financial Services Institutional Performance Analytics Version 8.0.7.8.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Liquidity Risk Measurement and Management" Type="Product Name">
               <Branch Name="8.0.7.3.1" Type="Product Version">
                  <FullProductName ProductID="P-13797V-8.0.7.3.1">Oracle Financial Services Liquidity Risk Measurement and Management Version 8.0.7.3.1</FullProductName>
               </Branch>
               <Branch Name="8.0.8.3.1" Type="Product Version">
                  <FullProductName ProductID="P-13797V-8.0.8.3.1">Oracle Financial Services Liquidity Risk Measurement and Management Version 8.0.8.3.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Loan Loss Forecasting and Provisioning" Type="Product Name">
               <Branch Name="8.0.7.8.1" Type="Product Version">
                  <FullProductName ProductID="P-9332V-8.0.7.8.1">Oracle Financial Services Loan Loss Forecasting and Provisioning Version 8.0.7.8.1</FullProductName>
               </Branch>
               <Branch Name="8.0.8.2.1" Type="Product Version">
                  <FullProductName ProductID="P-9332V-8.0.8.2.1">Oracle Financial Services Loan Loss Forecasting and Provisioning Version 8.0.8.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Model Management and Governance" Type="Product Name">
               <Branch Name="8.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-14276V-8.1.0.0">Oracle Financial Services Model Management and Governance Version 8.1.0.0</FullProductName>
               </Branch>
               <Branch Name="8.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-14276V-8.1.2.0">Oracle Financial Services Model Management and Governance Version 8.1.2.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Profitability Management" Type="Product Name">
               <Branch Name="8.0.7.8.1" Type="Product Version">
                  <FullProductName ProductID="P-5658V-8.0.7.8.1">Oracle Financial Services Profitability Management Version 8.0.7.8.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Regulatory Reporting" Type="Product Name">
               <Branch Name="8.0.8.1" Type="Product Version">
                  <FullProductName ProductID="P-9142V-8.0.8.1">Oracle Financial Services Regulatory Reporting Version 8.0.8.1</FullProductName>
               </Branch>
               <Branch Name="8.1.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9142V-8.1.1.1">Oracle Financial Services Regulatory Reporting Version 8.1.1.1</FullProductName>
               </Branch>
               <Branch Name="8.1.2.3" Type="Product Version">
                  <FullProductName ProductID="P-9142V-8.1.2.3">Oracle Financial Services Regulatory Reporting Version 8.1.2.3</FullProductName>
               </Branch>
               <Branch Name="8.1.2.4" Type="Product Version">
                  <FullProductName ProductID="P-9142V-8.1.2.4">Oracle Financial Services Regulatory Reporting Version 8.1.2.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Regulatory Reporting with AgileREPORTER" Type="Product Name">
               <Branch Name="8.1.1.2.0" Type="Product Version">
                  <FullProductName ProductID="P-13077V-8.1.1.2.0">Oracle Financial Services Regulatory Reporting with AgileREPORTER Version 8.1.1.2.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Retail Performance Analytics" Type="Product Name">
               <Branch Name="8.0.7.8.1" Type="Product Version">
                  <FullProductName ProductID="P-10216V-8.0.7.8.1">Oracle Financial Services Retail Performance Analytics Version 8.0.7.8.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Revenue Management and Billing" Type="Product Name">
               <Branch Name="2.7" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.7">Oracle Financial Services Revenue Management and Billing Version 2.7</FullProductName>
               </Branch>
               <Branch Name="2.7.1" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.7.1">Oracle Financial Services Revenue Management and Billing Version 2.7.1</FullProductName>
               </Branch>
               <Branch Name="2.8" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.8">Oracle Financial Services Revenue Management and Billing Version 2.8</FullProductName>
               </Branch>
               <Branch Name="2.9" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.9">Oracle Financial Services Revenue Management and Billing Version 2.9</FullProductName>
               </Branch>
               <Branch Name="2.9.1" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.9.1">Oracle Financial Services Revenue Management and Billing Version 2.9.1</FullProductName>
               </Branch>
               <Branch Name="3.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-3.0">Oracle Financial Services Revenue Management and Billing Version 3.0</FullProductName>
               </Branch>
               <Branch Name="3.1" Type="Product Version">
                  <FullProductName ProductID="P-5322V-3.1">Oracle Financial Services Revenue Management and Billing Version 3.1</FullProductName>
               </Branch>
               <Branch Name="3.2" Type="Product Version">
                  <FullProductName ProductID="P-5322V-3.2">Oracle Financial Services Revenue Management and Billing Version 3.2</FullProductName>
               </Branch>
               <Branch Name="4.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-4.0">Oracle Financial Services Revenue Management and Billing Version 4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition" Type="Product Name">
               <Branch Name="8.0.8.0.0" Type="Product Version">
                  <FullProductName ProductID="P-13789V-8.0.8.0.0">Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition Version 8.0.8.0.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Fusion Middleware" Type="Product Family">
            <Branch Name="Oracle Access Manager" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-5565V-12.2.1.4.0">Oracle Access Manager Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Business Process Management Suite" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-5325V-12.2.1.4.0">Oracle Business Process Management Suite Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Coherence" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-2545V-12.2.1.4.0">Oracle Coherence Version 12.2.1.4.0</FullProductName>
               </Branch>
               <Branch Name="14.1.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-2545V-14.1.1.0.0">Oracle Coherence Version 14.1.1.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Data Integrator" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-2196V-12.2.1.4.0">Oracle Data Integrator Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle HTTP Server" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-1042V-12.2.1.4.0">Oracle HTTP Server Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Identity Manager" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-1980V-12.2.1.4.0">Oracle Identity Manager Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle JDeveloper" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-807V-12.2.1.4.0">Oracle JDeveloper Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Managed File Transfer" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-10198V-12.2.1.4.0">Oracle Managed File Transfer Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Middleware Common Libraries and Tools" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-4647V-12.2.1.4.0">Oracle Middleware Common Libraries and Tools Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Outside In Technology" Type="Product Name">
               <Branch Name="8.5.6" Type="Product Version">
                  <FullProductName ProductID="P-2276V-8.5.6">Oracle Outside In Technology Version 8.5.6</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle SOA Suite" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-1675V-12.2.1.4.0">Oracle SOA Suite Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle WebCenter Portal" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-1696V-12.2.1.4.0">Oracle WebCenter Portal Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle WebCenter Sites" Type="Product Name">
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-9617V-12.2.1.4.0">Oracle WebCenter Sites Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle WebLogic Server" Type="Product Name">
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5242(Console)V-12.2.1.3.0">Oracle WebLogic Server(Console) Version 12.2.1.3.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5242(Third Party)V-12.2.1.3.0">Oracle WebLogic Server(Third Party) Version 12.2.1.3.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.2.1.3.0">Oracle WebLogic Server Version 12.2.1.3.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-5242(Console)V-12.2.1.4.0">Oracle WebLogic Server(Console) Version 12.2.1.4.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-5242(Third Party)V-12.2.1.4.0">Oracle WebLogic Server(Third Party) Version 12.2.1.4.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.2.1.4.0">Oracle WebLogic Server Version 12.2.1.4.0</FullProductName>
               </Branch>
               <Branch Name="14.1.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5242(Console)V-14.1.1.0.0">Oracle WebLogic Server(Console) Version 14.1.1.0.0</FullProductName>
               </Branch>
               <Branch Name="14.1.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5242(Third Party)V-14.1.1.0.0">Oracle WebLogic Server(Third Party) Version 14.1.1.0.0</FullProductName>
               </Branch>
               <Branch Name="14.1.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-14.1.1.0.0">Oracle WebLogic Server Version 14.1.1.0.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle GoldenGate" Type="Product Family">
            <Branch Name="Oracle GoldenGate" Type="Product Name">
               <Branch Name="Prior to 19.1.0.0.230418" Type="Product Version">
                  <FullProductName ProductID="P-5757V-Prior to 19.1.0.0.230418">Oracle GoldenGate Version Prior to 19.1.0.0.230418</FullProductName>
               </Branch>
               <Branch Name="Prior to 21.10.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5757V-Prior to 21.10.0.0.0">Oracle GoldenGate Version Prior to 21.10.0.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle GoldenGate Studio" Type="Product Name">
               <Branch Name="Fusion Middleware: 12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-10945V-Fusion Middleware: 12.2.1.4.0">Oracle GoldenGate Studio Version Fusion Middleware: 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Graph Server and Client" Type="Product Family">
            <Branch Name="Oracle Graph Server and Client" Type="Product Name">
               <Branch Name="Prior to 23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-14069V-Prior to 23.1.0">Oracle Graph Server and Client Version Prior to 23.1.0</FullProductName>
               </Branch>
               <Branch Name="Prior to 23.2.0" Type="Product Version">
                  <FullProductName ProductID="P-14069V-Prior to 23.2.0">Oracle Graph Server and Client Version Prior to 23.2.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Health Sciences Applications" Type="Product Family">
            <Branch Name="Oracle Argus Insight" Type="Product Name">
               <Branch Name="Prior to 8.2.3" Type="Product Version">
                  <FullProductName ProductID="P-5717V-Prior to 8.2.3">Oracle Argus Insight Version Prior to 8.2.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Argus Safety" Type="Product Name">
               <Branch Name="Prior to 8.2.3" Type="Product Version">
                  <FullProductName ProductID="P-5710V-Prior to 8.2.3">Oracle Argus Safety Version Prior to 8.2.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Clinical Remote Data Capture" Type="Product Name">
               <Branch Name="5.4.0.2" Type="Product Version">
                  <FullProductName ProductID="P-1041V-5.4.0.2">Oracle Clinical Remote Data Capture Version 5.4.0.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Health Sciences InForm" Type="Product Name">
               <Branch Name="Prior to 6.3.1.3" Type="Product Version">
                  <FullProductName ProductID="P-9636V-Prior to 6.3.1.3">Oracle Health Sciences InForm Version Prior to 6.3.1.3</FullProductName>
               </Branch>
               <Branch Name="Prior to 7.0.0.1" Type="Product Version">
                  <FullProductName ProductID="P-9636V-Prior to 7.0.0.1">Oracle Health Sciences InForm Version Prior to 7.0.0.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle HealthCare Applications" Type="Product Family">
            <Branch Name="Oracle Healthcare Foundation" Type="Product Name">
               <Branch Name="8.1.0" Type="Product Version">
                  <FullProductName ProductID="P-12950V-8.1.0">Oracle Healthcare Foundation Version 8.1.0</FullProductName>
               </Branch>
               <Branch Name="8.1.1" Type="Product Version">
                  <FullProductName ProductID="P-12950V-8.1.1">Oracle Healthcare Foundation Version 8.1.1</FullProductName>
               </Branch>
               <Branch Name="8.2.0" Type="Product Version">
                  <FullProductName ProductID="P-12950V-8.2.0">Oracle Healthcare Foundation Version 8.2.0</FullProductName>
               </Branch>
               <Branch Name="8.2.1" Type="Product Version">
                  <FullProductName ProductID="P-12950V-8.2.1">Oracle Healthcare Foundation Version 8.2.1</FullProductName>
               </Branch>
               <Branch Name="8.2.2" Type="Product Version">
                  <FullProductName ProductID="P-12950V-8.2.2">Oracle Healthcare Foundation Version 8.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Healthcare Master Person Index" Type="Product Name">
               <Branch Name="5.0.0-5.0.4" Type="Product Version">
                  <FullProductName ProductID="P-8575V-5.0.0-5.0.4">Oracle Healthcare Master Person Index Version 5.0.0-5.0.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Healthcare Translational Research" Type="Product Name">
               <Branch Name="4.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9427V-4.1.0">Oracle Healthcare Translational Research Version 4.1.0</FullProductName>
               </Branch>
               <Branch Name="4.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9427V-4.1.1">Oracle Healthcare Translational Research Version 4.1.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Hospitality Applications" Type="Product Family">
            <Branch Name="Oracle Hospitality OPERA 5 Property Services" Type="Product Name">
               <Branch Name="5.6" Type="Product Version">
                  <FullProductName ProductID="P-11580V-5.6">Oracle Hospitality OPERA 5 Property Services Version 5.6</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Hyperion" Type="Product Family">
            <Branch Name="Oracle Hyperion Financial Reporting" Type="Product Name">
               <Branch Name="11.2.12" Type="Product Version">
                  <FullProductName ProductID="P-8776V-11.2.12">Oracle Hyperion Financial Reporting Version 11.2.12</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Hyperion Infrastructure Technology" Type="Product Name">
               <Branch Name="11.2.12" Type="Product Version">
                  <FullProductName ProductID="P-4392V-11.2.12">Oracle Hyperion Infrastructure Technology Version 11.2.12</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Insurance Applications" Type="Product Family">
            <Branch Name="Oracle Documaker" Type="Product Name">
               <Branch Name="12.6.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5477V-12.6.0.0.0">Oracle Documaker Version 12.6.0.0.0</FullProductName>
               </Branch>
               <Branch Name="12.6.2.0.0-12.6.4.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5477V-12.6.2.0.0-12.6.4.0.0">Oracle Documaker Version 12.6.2.0.0-12.6.4.0.0</FullProductName>
               </Branch>
               <Branch Name="12.7.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5477V-12.7.0.0.0">Oracle Documaker Version 12.7.0.0.0</FullProductName>
               </Branch>
               <Branch Name="12.7.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5477V-12.7.1.0.0">Oracle Documaker Version 12.7.1.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Insurance Policy Administration Operational Data Store for Life and Annuity" Type="Product Name">
               <Branch Name="1.0.1.8" Type="Product Version">
                  <FullProductName ProductID="P-13339V-1.0.1.8">Oracle Insurance Policy Administration Operational Data Store for Life and Annuity Version 1.0.1.8</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle JD Edwards" Type="Product Family">
            <Branch Name="JD Edwards EnterpriseOne Orchestrator" Type="Product Name">
               <Branch Name="Prior to 9.2.7.3" Type="Product Version">
                  <FullProductName ProductID="P-11681V-Prior to 9.2.7.3">JD Edwards EnterpriseOne Orchestrator Version Prior to 9.2.7.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="JD Edwards EnterpriseOne Tools" Type="Product Name">
               <Branch Name="Prior to 9.2.7.2" Type="Product Version">
                  <FullProductName ProductID="P-4781V-Prior to 9.2.7.2">JD Edwards EnterpriseOne Tools Version Prior to 9.2.7.2</FullProductName>
               </Branch>
               <Branch Name="Prior to 9.2.7.3" Type="Product Version">
                  <FullProductName ProductID="P-4781V-Prior to 9.2.7.3">JD Edwards EnterpriseOne Tools Version Prior to 9.2.7.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="JD Edwards World Security" Type="Product Name">
               <Branch Name="A9.4" Type="Product Version">
                  <FullProductName ProductID="P-4839V-A9.4">JD Edwards World Security Version A9.4</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Java SE" Type="Product Family">
            <Branch Name="Oracle Java SE" Type="Product Name">
               <Branch Name="Oracle GraalVM Enterprise Edition:20.3.8" Type="Product Version">
                  <FullProductName ProductID="P-13497V-Oracle GraalVM Enterprise Edition:20.3.8">Oracle Java SE Version Oracle GraalVM Enterprise Edition:20.3.8</FullProductName>
               </Branch>
               <Branch Name="Oracle GraalVM Enterprise Edition:20.3.9" Type="Product Version">
                  <FullProductName ProductID="P-13497V-Oracle GraalVM Enterprise Edition:20.3.9">Oracle Java SE Version Oracle GraalVM Enterprise Edition:20.3.9</FullProductName>
               </Branch>
               <Branch Name="Oracle GraalVM Enterprise Edition:21.3.4" Type="Product Version">
                  <FullProductName ProductID="P-13497V-Oracle GraalVM Enterprise Edition:21.3.4">Oracle Java SE Version Oracle GraalVM Enterprise Edition:21.3.4</FullProductName>
               </Branch>
               <Branch Name="Oracle GraalVM Enterprise Edition:21.3.5" Type="Product Version">
                  <FullProductName ProductID="P-13497V-Oracle GraalVM Enterprise Edition:21.3.5">Oracle Java SE Version Oracle GraalVM Enterprise Edition:21.3.5</FullProductName>
               </Branch>
               <Branch Name="Oracle GraalVM Enterprise Edition:22.3.0" Type="Product Version">
                  <FullProductName ProductID="P-13497V-Oracle GraalVM Enterprise Edition:22.3.0">Oracle Java SE Version Oracle GraalVM Enterprise Edition:22.3.0</FullProductName>
               </Branch>
               <Branch Name="Oracle GraalVM Enterprise Edition:22.3.1" Type="Product Version">
                  <FullProductName ProductID="P-13497V-Oracle GraalVM Enterprise Edition:22.3.1">Oracle Java SE Version Oracle GraalVM Enterprise Edition:22.3.1</FullProductName>
               </Branch>
               <Branch Name="Oracle Java SE:11.0.18" Type="Product Version">
                  <FullProductName ProductID="P-856V-Oracle Java SE:11.0.18">Oracle Java SE Version Oracle Java SE:11.0.18</FullProductName>
               </Branch>
               <Branch Name="Oracle Java SE:17.0.6" Type="Product Version">
                  <FullProductName ProductID="P-856V-Oracle Java SE:17.0.6">Oracle Java SE Version Oracle Java SE:17.0.6</FullProductName>
               </Branch>
               <Branch Name="Oracle Java SE:20" Type="Product Version">
                  <FullProductName ProductID="P-856V-Oracle Java SE:20">Oracle Java SE Version Oracle Java SE:20</FullProductName>
               </Branch>
               <Branch Name="Oracle Java SE:8u361" Type="Product Version">
                  <FullProductName ProductID="P-856V-Oracle Java SE:8u361">Oracle Java SE Version Oracle Java SE:8u361</FullProductName>
               </Branch>
               <Branch Name="Oracle Java SE:8u361-perf" Type="Product Version">
                  <FullProductName ProductID="P-856V-Oracle Java SE:8u361-perf">Oracle Java SE Version Oracle Java SE:8u361-perf</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle MySQL" Type="Product Family">
            <Branch Name="MySQL Cluster" Type="Product Name">
               <Branch Name="7.5.29 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8479V-7.5.29 and prior">MySQL Cluster Version 7.5.29 and prior</FullProductName>
               </Branch>
               <Branch Name="7.6.25 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8479V-7.6.25 and prior">MySQL Cluster Version 7.6.25 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.31 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8479V-8.0.31 and prior">MySQL Cluster Version 8.0.31 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.32 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8479V-8.0.32 and prior">MySQL Cluster Version 8.0.32 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Connectors" Type="Product Name">
               <Branch Name="8.0.32 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8576(Connector/C++)V-8.0.32 and prior">MySQL Connectors(Connector/C++) Version 8.0.32 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.32 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8576(Connector/ODBC)V-8.0.32 and prior">MySQL Connectors(Connector/ODBC) Version 8.0.32 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.32 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8576V-8.0.32 and prior">MySQL Connectors Version 8.0.32 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Enterprise Monitor" Type="Product Name">
               <Branch Name="8.0.33 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8480V-8.0.33 and prior">MySQL Enterprise Monitor Version 8.0.33 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Server" Type="Product Name">
               <Branch Name="5.7.40 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.7.40 and prior">MySQL Server Version 5.7.40 and prior</FullProductName>
               </Branch>
               <Branch Name="5.7.41 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.7.41 and prior">MySQL Server Version 5.7.41 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.30 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-8.0.30 and prior">MySQL Server Version 8.0.30 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.31 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-8.0.31 and prior">MySQL Server Version 8.0.31 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.32 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-8.0.32 and prior">MySQL Server Version 8.0.32 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Workbench" Type="Product Name">
               <Branch Name="8.0.32 and prior" Type="Product Version">
                  <FullProductName ProductID="P-4627V-8.0.32 and prior">MySQL Workbench Version 8.0.32 and prior</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle NoSQL Database" Type="Product Family">
            <Branch Name="Oracle NoSQL Database" Type="Product Name">
               <Branch Name="Prior to 19.5.32" Type="Product Version">
                  <FullProductName ProductID="P-13373V-Prior to 19.5.32">Oracle NoSQL Database Version Prior to 19.5.32</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle PeopleSoft" Type="Product Family">
            <Branch Name="PeopleSoft Enterprise HCM Human Resources" Type="Product Name">
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-5071V-9.2">PeopleSoft Enterprise HCM Human Resources Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise PeopleTools" Type="Product Name">
               <Branch Name="8.58" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.58">PeopleSoft Enterprise PeopleTools Version 8.58</FullProductName>
               </Branch>
               <Branch Name="8.59" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.59">PeopleSoft Enterprise PeopleTools Version 8.59</FullProductName>
               </Branch>
               <Branch Name="8.60" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.60">PeopleSoft Enterprise PeopleTools Version 8.60</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle REST Data Services" Type="Product Family">
            <Branch Name="Oracle REST Data Services" Type="Product Name">
               <Branch Name="Prior to 23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9456V-Prior to 23.1.0">Oracle REST Data Services Version Prior to 23.1.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Retail Applications" Type="Product Family">
            <Branch Name="Oracle Retail Customer Management and Segmentation Foundation" Type="Product Name">
               <Branch Name="18.0.0.12" Type="Product Version">
                  <FullProductName ProductID="P-13388V-18.0.0.12">Oracle Retail Customer Management and Segmentation Foundation Version 18.0.0.12</FullProductName>
               </Branch>
               <Branch Name="19.0.0.6" Type="Product Version">
                  <FullProductName ProductID="P-13388V-19.0.0.6">Oracle Retail Customer Management and Segmentation Foundation Version 19.0.0.6</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Retail Fiscal Management" Type="Product Name">
               <Branch Name="14.2" Type="Product Version">
                  <FullProductName ProductID="P-9038V-14.2">Oracle Retail Fiscal Management Version 14.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Retail Invoice Matching" Type="Product Name">
               <Branch Name="15.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1810V-15.0.3">Oracle Retail Invoice Matching Version 15.0.3</FullProductName>
               </Branch>
               <Branch Name="16.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1810V-16.0.3">Oracle Retail Invoice Matching Version 16.0.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Retail Merchandising System" Type="Product Name">
               <Branch Name="15.0.3.1" Type="Product Version">
                  <FullProductName ProductID="P-1816V-15.0.3.1">Oracle Retail Merchandising System Version 15.0.3.1</FullProductName>
               </Branch>
               <Branch Name="16.0.2" Type="Product Version">
                  <FullProductName ProductID="P-1816V-16.0.2">Oracle Retail Merchandising System Version 16.0.2</FullProductName>
               </Branch>
               <Branch Name="16.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1816V-16.0.3">Oracle Retail Merchandising System Version 16.0.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Retail Predictive Application Server" Type="Product Name">
               <Branch Name="15.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1823V-15.0.3">Oracle Retail Predictive Application Server Version 15.0.3</FullProductName>
               </Branch>
               <Branch Name="16.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1823V-16.0.3">Oracle Retail Predictive Application Server Version 16.0.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Retail Price Management" Type="Product Name">
               <Branch Name="14.1.3.2" Type="Product Version">
                  <FullProductName ProductID="P-1824V-14.1.3.2">Oracle Retail Price Management Version 14.1.3.2</FullProductName>
               </Branch>
               <Branch Name="15.0.3.1" Type="Product Version">
                  <FullProductName ProductID="P-1824V-15.0.3.1">Oracle Retail Price Management Version 15.0.3.1</FullProductName>
               </Branch>
               <Branch Name="16.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1824V-16.0.3">Oracle Retail Price Management Version 16.0.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Retail Sales Audit" Type="Product Name">
               <Branch Name="15.0.3.1" Type="Product Version">
                  <FullProductName ProductID="P-1834V-15.0.3.1">Oracle Retail Sales Audit Version 15.0.3.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Retail Xstore Office Cloud Service" Type="Product Name">
               <Branch Name="18.0.5" Type="Product Version">
                  <FullProductName ProductID="P-13551V-18.0.5">Oracle Retail Xstore Office Cloud Service Version 18.0.5</FullProductName>
               </Branch>
               <Branch Name="19.0.4" Type="Product Version">
                  <FullProductName ProductID="P-13551V-19.0.4">Oracle Retail Xstore Office Cloud Service Version 19.0.4</FullProductName>
               </Branch>
               <Branch Name="20.0.3" Type="Product Version">
                  <FullProductName ProductID="P-13551V-20.0.3">Oracle Retail Xstore Office Cloud Service Version 20.0.3</FullProductName>
               </Branch>
               <Branch Name="21.0.2" Type="Product Version">
                  <FullProductName ProductID="P-13551V-21.0.2">Oracle Retail Xstore Office Cloud Service Version 21.0.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Retail Xstore Point of Service" Type="Product Name">
               <Branch Name="17.0.6" Type="Product Version">
                  <FullProductName ProductID="P-11513V-17.0.6">Oracle Retail Xstore Point of Service Version 17.0.6</FullProductName>
               </Branch>
               <Branch Name="18.0.5" Type="Product Version">
                  <FullProductName ProductID="P-11513(Point of Sale)V-18.0.5">Oracle Retail Xstore Point of Service(Point of Sale) Version 18.0.5</FullProductName>
               </Branch>
               <Branch Name="18.0.5" Type="Product Version">
                  <FullProductName ProductID="P-11513(Xenvironment)V-18.0.5">Oracle Retail Xstore Point of Service(Xenvironment) Version 18.0.5</FullProductName>
               </Branch>
               <Branch Name="18.0.5" Type="Product Version">
                  <FullProductName ProductID="P-11513V-18.0.5">Oracle Retail Xstore Point of Service Version 18.0.5</FullProductName>
               </Branch>
               <Branch Name="19.0.4" Type="Product Version">
                  <FullProductName ProductID="P-11513(Point of Sale)V-19.0.4">Oracle Retail Xstore Point of Service(Point of Sale) Version 19.0.4</FullProductName>
               </Branch>
               <Branch Name="19.0.4" Type="Product Version">
                  <FullProductName ProductID="P-11513(Xenvironment)V-19.0.4">Oracle Retail Xstore Point of Service(Xenvironment) Version 19.0.4</FullProductName>
               </Branch>
               <Branch Name="19.0.4" Type="Product Version">
                  <FullProductName ProductID="P-11513V-19.0.4">Oracle Retail Xstore Point of Service Version 19.0.4</FullProductName>
               </Branch>
               <Branch Name="20.0.3" Type="Product Version">
                  <FullProductName ProductID="P-11513(Point of Sale)V-20.0.3">Oracle Retail Xstore Point of Service(Point of Sale) Version 20.0.3</FullProductName>
               </Branch>
               <Branch Name="20.0.3" Type="Product Version">
                  <FullProductName ProductID="P-11513(Xenvironment)V-20.0.3">Oracle Retail Xstore Point of Service(Xenvironment) Version 20.0.3</FullProductName>
               </Branch>
               <Branch Name="20.0.3" Type="Product Version">
                  <FullProductName ProductID="P-11513V-20.0.3">Oracle Retail Xstore Point of Service Version 20.0.3</FullProductName>
               </Branch>
               <Branch Name="21.0.2" Type="Product Version">
                  <FullProductName ProductID="P-11513(Point of Sale)V-21.0.2">Oracle Retail Xstore Point of Service(Point of Sale) Version 21.0.2</FullProductName>
               </Branch>
               <Branch Name="21.0.2" Type="Product Version">
                  <FullProductName ProductID="P-11513(Xenvironment)V-21.0.2">Oracle Retail Xstore Point of Service(Xenvironment) Version 21.0.2</FullProductName>
               </Branch>
               <Branch Name="21.0.2" Type="Product Version">
                  <FullProductName ProductID="P-11513V-21.0.2">Oracle Retail Xstore Point of Service Version 21.0.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle SQL Developer" Type="Product Family">
            <Branch Name="Oracle SQL Developer" Type="Product Name">
               <Branch Name="Prior to 22.4.0" Type="Product Version">
                  <FullProductName ProductID="P-1875V-Prior to 22.4.0">Oracle SQL Developer Version Prior to 22.4.0</FullProductName>
               </Branch>
               <Branch Name="Prior to 23.1.0" Type="Product Version">
                  <FullProductName ProductID="P-1875V-Prior to 23.1.0">Oracle SQL Developer Version Prior to 23.1.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Siebel CRM" Type="Product Family">
            <Branch Name="Siebel CRM" Type="Product Name">
               <Branch Name="21.10 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9011V-21.10 and prior">Siebel CRM Version 21.10 and prior</FullProductName>
               </Branch>
               <Branch Name="22.10 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9001V-22.10 and prior">Siebel CRM Version 22.10 and prior</FullProductName>
               </Branch>
               <Branch Name="22.5 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9001V-22.5 and prior">Siebel CRM Version 22.5 and prior</FullProductName>
               </Branch>
               <Branch Name="23.2 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9001V-23.2 and prior">Siebel CRM Version 23.2 and prior</FullProductName>
               </Branch>
               <Branch Name="23.2 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9011V-23.2 and prior">Siebel CRM Version 23.2 and prior</FullProductName>
               </Branch>
               <Branch Name="23.3 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9011V-23.3 and prior">Siebel CRM Version 23.3 and prior</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Supply Chain" Type="Product Family">
            <Branch Name="Oracle Agile PLM" Type="Product Name">
               <Branch Name="9.3.6" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.6">Oracle Agile PLM Version 9.3.6</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Systems" Type="Product Family">
            <Branch Name="Oracle Solaris" Type="Product Name">
               <Branch Name="10" Type="Product Version">
                  <FullProductName ProductID="P-10006V-10">Oracle Solaris Version 10</FullProductName>
               </Branch>
               <Branch Name="11" Type="Product Version">
                  <FullProductName ProductID="P-10006V-11">Oracle Solaris Version 11</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle TimesTen In-Memory Database" Type="Product Family">
            <Branch Name="Oracle TimesTen In-Memory Database" Type="Product Name">
               <Branch Name="Prior to 22.1.1.7.0" Type="Product Version">
                  <FullProductName ProductID="P-1870V-Prior to 22.1.1.7.0">Oracle TimesTen In-Memory Database Version Prior to 22.1.1.7.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Utilities Applications" Type="Product Family">
            <Branch Name="Oracle Utilities Application Framework" Type="Product Name">
               <Branch Name="4.2.0.3.0" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.2.0.3.0">Oracle Utilities Application Framework Version 4.2.0.3.0</FullProductName>
               </Branch>
               <Branch Name="4.3.0.1.0-4.3.0.6.0" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.3.0.1.0-4.3.0.6.0">Oracle Utilities Application Framework Version 4.3.0.1.0-4.3.0.6.0</FullProductName>
               </Branch>
               <Branch Name="4.4.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.4.0.0.0">Oracle Utilities Application Framework Version 4.4.0.0.0</FullProductName>
               </Branch>
               <Branch Name="4.4.0.2.0" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.4.0.2.0">Oracle Utilities Application Framework Version 4.4.0.2.0</FullProductName>
               </Branch>
               <Branch Name="4.4.0.3.0" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.4.0.3.0">Oracle Utilities Application Framework Version 4.4.0.3.0</FullProductName>
               </Branch>
               <Branch Name="4.5.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.5.0.0.0">Oracle Utilities Application Framework Version 4.5.0.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Utilities Network Management System" Type="Product Name">
               <Branch Name="2.3.0.2" Type="Product Version">
                  <FullProductName ProductID="P-2241V-2.3.0.2">Oracle Utilities Network Management System Version 2.3.0.2</FullProductName>
               </Branch>
               <Branch Name="2.4.0.1" Type="Product Version">
                  <FullProductName ProductID="P-2241V-2.4.0.1">Oracle Utilities Network Management System Version 2.4.0.1</FullProductName>
               </Branch>
               <Branch Name="2.5.0.0" Type="Product Version">
                  <FullProductName ProductID="P-2241V-2.5.0.0">Oracle Utilities Network Management System Version 2.5.0.0</FullProductName>
               </Branch>
               <Branch Name="2.5.0.1" Type="Product Version">
                  <FullProductName ProductID="P-2241V-2.5.0.1">Oracle Utilities Network Management System Version 2.5.0.1</FullProductName>
               </Branch>
               <Branch Name="2.5.0.2" Type="Product Version">
                  <FullProductName ProductID="P-2241V-2.5.0.2">Oracle Utilities Network Management System Version 2.5.0.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Virtualization" Type="Product Family">
            <Branch Name="Oracle VM VirtualBox" Type="Product Name">
               <Branch Name="Prior to 6.1.44" Type="Product Version">
                  <FullProductName ProductID="P-8370V-Prior to 6.1.44">Oracle VM VirtualBox Version Prior to 6.1.44</FullProductName>
               </Branch>
               <Branch Name="Prior to 7.0.8" Type="Product Version">
                  <FullProductName ProductID="P-8370V-Prior to 7.0.8">Oracle VM VirtualBox Version Prior to 7.0.8</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle iLearning" Type="Product Family">
            <Branch Name="Oracle iLearning" Type="Product Name">
               <Branch Name="6.3.1" Type="Product Version">
                  <FullProductName ProductID="P-902V-6.3.1">Oracle iLearning Version 6.3.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
      </Branch>
   </ProductTree>
   <Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1000656</Title>
      <Notes>
         <Note Audience="All" Ordinal="1" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Machine Learning (Flask)).   The supported version that is affected is 6.4.0.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 4.8 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1000656</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.8</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1311</Title>
      <Notes>
         <Note Audience="All" Ordinal="2" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Enterprise Infrastructure (Apache Xerces-C++)).  Supported versions that are affected are Prior to 9.2.7.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via JDENET to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1311</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-14371</Title>
      <Notes>
         <Note Audience="All" Ordinal="3" Title="Details" Type="Details">Vulnerability in the Oracle JDeveloper product of Oracle Fusion Middleware (component: ADF Faces (Eclipse Mojarra)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle JDeveloper accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-14371</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-807V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle JDeveloper</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-807V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-10086</Title>
      <Notes>
         <Note Audience="All" Ordinal="4" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server (Apache Commons BeanUtils)).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-10086</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-10086</Title>
      <Notes>
         <Note Audience="All" Ordinal="5" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration Operational Data Store for Life and Annuity product of Oracle Insurance Applications (component: Logger (Apache Commons BeanUtils)).   The supported version that is affected is 1.0.1.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration Operational Data Store for Life and Annuity.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Insurance Policy Administration Operational Data Store for Life and Annuity accessible data as well as  unauthorized read access to a subset of Oracle Insurance Policy Administration Operational Data Store for Life and Annuity accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Insurance Policy Administration Operational Data Store for Life and Annuity. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-10086</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Insurance Policy Administration Operational Data Store for Life and Annuity</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-10172</Title>
      <Notes>
         <Note Audience="All" Ordinal="6" Title="Details" Type="Details">Security-in-Depth issue in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: BIInfer (Jackson-mapper-asl)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-10172</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11287</Title>
      <Notes>
         <Note Audience="All" Ordinal="7" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Core (Pivotal RabbitMQ)).  Supported versions that are affected are 5.5.0-5.5.10 and  6.0.0-6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Unified Assurance. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11287</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-12415</Title>
      <Notes>
         <Note Audience="All" Ordinal="8" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Infrastructure (Apache POI)).  Supported versions that are affected are 2.7, 2.8 and  2.9. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Financial Services Revenue Management and Billing executes to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-12415</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Revenue Management and Billing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938972.1</URL>
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-18935</Title>
      <Notes>
         <Note Audience="All" Ordinal="9" Title="Details" Type="Details">Vulnerability in the Oracle Argus Insight product of Oracle Health Sciences Applications (component: Core (Telerik UI for ASP.NET AJAX)).  Supported versions that are affected are Prior to  8.2.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus Insight.  Successful attacks of this vulnerability can result in takeover of Oracle Argus Insight. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-18935</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5717V-Prior to 8.2.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Argus Insight</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-5717V-Prior to 8.2.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-18935</Title>
      <Notes>
         <Note Audience="All" Ordinal="10" Title="Details" Type="Details">Vulnerability in the Oracle Argus Safety product of Oracle Health Sciences Applications (component: Core (Telerik UI for ASP.NET AJAX)).  Supported versions that are affected are Prior to 8.2.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus Safety.  Successful attacks of this vulnerability can result in takeover of Oracle Argus Safety. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-18935</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5710V-Prior to 8.2.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Argus Safety</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-5710V-Prior to 8.2.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-20916</Title>
      <Notes>
         <Note Audience="All" Ordinal="11" Title="Details" Type="Details">Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Third Party (Jython)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Access Manager. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-20916</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5565V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Access Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5565V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-11987</Title>
      <Notes>
         <Note Audience="All" Ordinal="12" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration Operational Data Store for Life and Annuity product of Oracle Insurance Applications (component: Logger (Apache Batik)).   The supported version that is affected is 1.0.1.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration Operational Data Store for Life and Annuity.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Insurance Policy Administration Operational Data Store for Life and Annuity accessible data as well as  unauthorized update, insert or delete access to some of Oracle Insurance Policy Administration Operational Data Store for Life and Annuity accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-11987</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Insurance Policy Administration Operational Data Store for Life and Annuity</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-11987</Title>
      <Notes>
         <Note Audience="All" Ordinal="13" Title="Details" Type="Details">Security-in-Depth issue in the Oracle Utilities Network Management System product of Oracle Utilities Applications (component: System Wide (Apache Batik)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-11987</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-2241V-2.3.0.2</ProductID>
            <ProductID>P-2241V-2.4.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.0</ProductID>
            <ProductID>P-2241V-2.5.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Utilities Network Management System</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936478.1</URL>
            <ProductID>P-2241V-2.3.0.2</ProductID>
            <ProductID>P-2241V-2.4.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.0</ProductID>
            <ProductID>P-2241V-2.5.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="14" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-11988</Title>
      <Notes>
         <Note Audience="All" Ordinal="14" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Infrastructure (Apache XML Graphics Commons)).  Supported versions that are affected are 2.7, 2.8 and  2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Financial Services Revenue Management and Billing accessible data as well as  unauthorized update, insert or delete access to some of Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-11988</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Revenue Management and Billing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938972.1</URL>
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="15" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-13936</Title>
      <Notes>
         <Note Audience="All" Ordinal="15" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Application Framework product of Oracle Utilities Applications (component: General (Apache Velocity Engine)).  Supported versions that are affected are 4.2.0.3.0, 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0 and  4.4.0.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Utilities Application Framework.  Successful attacks of this vulnerability can result in takeover of Oracle Utilities Application Framework. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-13936</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2245V-4.2.0.3.0</ProductID>
            <ProductID>P-2245V-4.3.0.1.0-4.3.0.6.0</ProductID>
            <ProductID>P-2245V-4.4.0.0.0</ProductID>
            <ProductID>P-2245V-4.4.0.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Utilities Application Framework</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936478.1</URL>
            <ProductID>P-2245V-4.2.0.3.0</ProductID>
            <ProductID>P-2245V-4.3.0.1.0-4.3.0.6.0</ProductID>
            <ProductID>P-2245V-4.4.0.0.0</ProductID>
            <ProductID>P-2245V-4.4.0.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="16" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-13954</Title>
      <Notes>
         <Note Audience="All" Ordinal="16" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Samples (Apache CXF)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data as well as  unauthorized read access to a subset of Oracle WebCenter Sites accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-13954</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9617V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebCenter Sites</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-9617V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="17" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-14343</Title>
      <Notes>
         <Note Audience="All" Ordinal="17" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Porting (PyYAML)).  Supported versions that are affected are 8.58 and  8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-14343</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="18" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-15250</Title>
      <Notes>
         <Note Audience="All" Ordinal="18" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Business Logic Infra SEC (jUnit)).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where JD Edwards EnterpriseOne Tools executes to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-15250</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="19" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-17521</Title>
      <Notes>
         <Note Audience="All" Ordinal="19" Title="Details" Type="Details">Vulnerability in Oracle iLearning (component: Installation (Apache Groovy)).   The supported version that is affected is 6.3.1. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle iLearning executes to compromise Oracle iLearning.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle iLearning accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-17521</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-902V-6.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle iLearning</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939823.1</URL>
            <ProductID>P-902V-6.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="20" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-25638</Title>
      <Notes>
         <Note Audience="All" Ordinal="20" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core (JBoss Enterprise Application Platform)).   The supported version that is affected is 14.1.1.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as  unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-25638</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.4</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="21" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-25649</Title>
      <Notes>
         <Note Audience="All" Ordinal="21" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration Operational Data Store for Life and Annuity product of Oracle Insurance Applications (component: Logger (jackson-databind)).   The supported version that is affected is 1.0.1.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration Operational Data Store for Life and Annuity.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Insurance Policy Administration Operational Data Store for Life and Annuity accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-25649</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Insurance Policy Administration Operational Data Store for Life and Annuity</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="22" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-28052</Title>
      <Notes>
         <Note Audience="All" Ordinal="22" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Web General (Bouncy Castle Java Library)).   The supported version that is affected is 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in takeover of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-28052</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="23" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-35168</Title>
      <Notes>
         <Note Audience="All" Ordinal="23" Title="Details" Type="Details">Vulnerability in the Oracle Communications IP Service Activator product of Oracle Communications Applications (component: Other (Dell BSAFE Micro Edition Suite)).  Supported versions that are affected are 7.4.0 and  7.5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Oracle Communications IP Service Activator.  Successful attacks of this vulnerability can result in takeover of Oracle Communications IP Service Activator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-35168</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2261V-7.4.0</ProductID>
            <ProductID>P-2261V-7.5.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications IP Service Activator</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936021.1</URL>
            <ProductID>P-2261V-7.4.0</ProductID>
            <ProductID>P-2261V-7.5.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="24" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-35168</Title>
      <Notes>
         <Note Audience="All" Ordinal="24" Title="Details" Type="Details">Vulnerability in the Oracle Documaker product of Oracle Insurance Applications (component: Development Tools (Dell BSAFE Micro Edition Suite)).  Supported versions that are affected are 12.6.0.0.0, 12.6.2.0.0-12.6.4.0.0, 12.7.0.0.0 and  12.7.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Documaker.  Successful attacks of this vulnerability can result in takeover of Oracle Documaker. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-35168</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5477V-12.6.0.0.0</ProductID>
            <ProductID>P-5477V-12.6.2.0.0-12.6.4.0.0</ProductID>
            <ProductID>P-5477V-12.7.0.0.0</ProductID>
            <ProductID>P-5477V-12.7.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Documaker</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-5477V-12.6.0.0.0</ProductID>
            <ProductID>P-5477V-12.6.2.0.0-12.6.4.0.0</ProductID>
            <ProductID>P-5477V-12.7.0.0.0</ProductID>
            <ProductID>P-5477V-12.7.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="25" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-35168</Title>
      <Notes>
         <Note Audience="All" Ordinal="25" Title="Details" Type="Details">Vulnerability in the Oracle Retail Predictive Application Server product of Oracle Retail Applications (component: RPAS Server (Dell BSAFE Micro Edition Suite)).  Supported versions that are affected are 15.0.3 and  16.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Predictive Application Server.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Predictive Application Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-35168</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1823V-15.0.3</ProductID>
            <ProductID>P-1823V-16.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Predictive Application Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-1823V-15.0.3</ProductID>
            <ProductID>P-1823V-16.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="26" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-35169</Title>
      <Notes>
         <Note Audience="All" Ordinal="26" Title="Details" Type="Details">Vulnerability in Oracle Blockchain Platform (component: BCS Console (Dell BSAFE Micro Edition Suite)).  Supported versions that are affected are Prior to 21.1.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Oracle Blockchain Platform.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Blockchain Platform accessible data as well as  unauthorized access to critical data or complete access to all Oracle Blockchain Platform accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-35169</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.4</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="27" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-36518</Title>
      <Notes>
         <Note Audience="All" Ordinal="27" Title="Details" Type="Details">Vulnerability in Oracle Blockchain Platform (component: BCS Console (jackson-databind)).  Supported versions that are affected are Prior to 21.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Blockchain Platform.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Blockchain Platform. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-36518</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="28" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-6950</Title>
      <Notes>
         <Note Audience="All" Ordinal="28" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Third Party (Eclipse Mojarra)).  Supported versions that are affected are 12.2.1.3.0 and  12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-6950</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="29" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-7009</Title>
      <Notes>
         <Note Audience="All" Ordinal="29" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Core (Elasticsearch)).  Supported versions that are affected are 5.5.0-5.5.9 and  6.0.0-6.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Unified Assurance. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-7009</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.9</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.9</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="30" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-7712</Title>
      <Notes>
         <Note Audience="All" Ordinal="30" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Apache ZooKeeper)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-7712</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="31" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-7712</Title>
      <Notes>
         <Note Audience="All" Ordinal="31" Title="Details" Type="Details">Vulnerability in the Siebel CRM product of Oracle Siebel CRM (component: Loging (Apache ZooKeeper)).  Supported versions that are affected are 22.5 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Siebel CRM.  Successful attacks of this vulnerability can result in takeover of Siebel CRM. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-7712</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9001V-22.5 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.2</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Siebel CRM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939854.1</URL>
            <ProductID>P-9001V-22.5 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="32" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2020-8908</Title>
      <Notes>
         <Note Audience="All" Ordinal="32" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Orchestrator product of Oracle JD Edwards (component: E1 IOT Orchestrator Security (Google Guava)).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where JD Edwards EnterpriseOne Orchestrator executes to compromise JD Edwards EnterpriseOne Orchestrator.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of JD Edwards EnterpriseOne Orchestrator accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2020-8908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11681V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Orchestrator</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-11681V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="33" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-22569</Title>
      <Notes>
         <Note Audience="All" Ordinal="33" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Third Party (Google Protobuf-Java)).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle WebLogic Server executes to compromise Oracle WebLogic Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 5.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-22569</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="34" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-23017</Title>
      <Notes>
         <Note Audience="All" Ordinal="34" Title="Details" Type="Details">Vulnerability in Oracle Blockchain Platform (component: BCS Console (nginx)).  Supported versions that are affected are Prior to 21.1.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via UDP to compromise Oracle Blockchain Platform.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Blockchain Platform accessible data as well as  unauthorized access to critical data or complete access to all Oracle Blockchain Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Blockchain Platform. CVSS 3.1 Base Score 7.7 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-23017</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="35" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-23337</Title>
      <Notes>
         <Note Audience="All" Ordinal="35" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Lodash)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-23337</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="36" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-23413</Title>
      <Notes>
         <Note Audience="All" Ordinal="36" Title="Details" Type="Details">Vulnerability in the Primavera Unifier product of Oracle Construction and Engineering (component: User Interface (JSZip)).  Supported versions that are affected are 18.8.0-18.8.18, 19.12.0-19.12.16, 20.12.0-20.12.16, 21.12.0-21.12.14 and  22.12.0-22.12.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Primavera Unifier. CVSS 3.1 Base Score 4.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-23413</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-18.8.0-18.8.18</ProductID>
            <ProductID>P-10354V-19.12.0-19.12.16</ProductID>
            <ProductID>P-10354V-20.12.0-20.12.16</ProductID>
            <ProductID>P-10354V-21.12.0-21.12.14</ProductID>
            <ProductID>P-10354V-22.12.0-22.12.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Primavera Unifier</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936154.1</URL>
            <ProductID>P-10354V-18.8.0-18.8.18</ProductID>
            <ProductID>P-10354V-19.12.0-19.12.16</ProductID>
            <ProductID>P-10354V-20.12.0-20.12.16</ProductID>
            <ProductID>P-10354V-21.12.0-21.12.14</ProductID>
            <ProductID>P-10354V-22.12.0-22.12.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="37" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-2351</Title>
      <Notes>
         <Note Audience="All" Ordinal="37" Title="Details" Type="Details">Vulnerability in Oracle iLearning (component: Installation (JDBC)).   The supported version that is affected is 6.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Oracle iLearning.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iLearning, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle iLearning. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-2351</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-902V-6.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.3</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle iLearning</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939823.1</URL>
            <ProductID>P-902V-6.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="38" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-23926</Title>
      <Notes>
         <Note Audience="All" Ordinal="38" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Visual Analyzer (Apache POI)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 7.3 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-23926</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="39" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-27568</Title>
      <Notes>
         <Note Audience="All" Ordinal="39" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: BI Application Archive (json-smart)).   The supported version that is affected is 6.4.0.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-27568</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="40" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-28168</Title>
      <Notes>
         <Note Audience="All" Ordinal="40" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Backend (Eclipse Jersey)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-28168</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="41" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-29425</Title>
      <Notes>
         <Note Audience="All" Ordinal="41" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Infrastructure (Apache Commons IO)).  Supported versions that are affected are 2.7, 2.8, 2.9, 3.0, 3.1, 3.2 and  4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Revenue Management and Billing accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-29425</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.8</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Revenue Management and Billing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938972.1</URL>
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="42" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-29921</Title>
      <Notes>
         <Note Audience="All" Ordinal="42" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Python)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-29921</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="43" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-30129</Title>
      <Notes>
         <Note Audience="All" Ordinal="43" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Interoperability SEC (Apache Mina SSHD)).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-30129</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="44" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-31684</Title>
      <Notes>
         <Note Audience="All" Ordinal="44" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Third Party (json-smart)).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-31684</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="45" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-34798</Title>
      <Notes>
         <Note Audience="All" Ordinal="45" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: SSL Module (Apache HTTP Server)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle HTTP Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-34798</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle HTTP Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1042V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="46" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-35043</Title>
      <Notes>
         <Note Audience="All" Ordinal="46" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration Operational Data Store for Life and Annuity product of Oracle Insurance Applications (component: Logger (AntiSamy)).   The supported version that is affected is 1.0.1.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration Operational Data Store for Life and Annuity.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Insurance Policy Administration Operational Data Store for Life and Annuity, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Insurance Policy Administration Operational Data Store for Life and Annuity accessible data as well as  unauthorized read access to a subset of Oracle Insurance Policy Administration Operational Data Store for Life and Annuity accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-35043</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Insurance Policy Administration Operational Data Store for Life and Annuity</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="47" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-36090</Title>
      <Notes>
         <Note Audience="All" Ordinal="47" Title="Details" Type="Details">Vulnerability in Oracle Blockchain Platform (component: BCS Console (Apache Commons Compress)).  Supported versions that are affected are Prior to 21.1.3. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Blockchain Platform.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Blockchain Platform. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-36090</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="48" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-36090</Title>
      <Notes>
         <Note Audience="All" Ordinal="48" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Content Storage Service (Apache Commons Compress)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-36090</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="49" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-36090</Title>
      <Notes>
         <Note Audience="All" Ordinal="49" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Infrastructure (Apache Commons Compress)).  Supported versions that are affected are 2.7, 2.8 and  2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Revenue Management and Billing. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-36090</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Revenue Management and Billing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938972.1</URL>
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="50" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-36090</Title>
      <Notes>
         <Note Audience="All" Ordinal="50" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Third Party (Apache Commons Compress)).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-36090</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="51" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-36373</Title>
      <Notes>
         <Note Audience="All" Ordinal="51" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Deployment SEC (Apache Ant)).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where JD Edwards EnterpriseOne Tools executes to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 5.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-36373</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="52" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-36374</Title>
      <Notes>
         <Note Audience="All" Ordinal="52" Title="Details" Type="Details">Vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager (component: Load Testing for Web Apps (Apache Ant)).   The supported version that is affected is 13.3.0.1. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Application Testing Suite executes to compromise Oracle Application Testing Suite.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Application Testing Suite. CVSS 3.1 Base Score 5.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-36374</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4622V-13.3.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Application Testing Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923367.1</URL>
            <ProductID>P-4622V-13.3.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="53" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-36374</Title>
      <Notes>
         <Note Audience="All" Ordinal="53" Title="Details" Type="Details">Vulnerability in the Oracle Hyperion Infrastructure Technology product of Oracle Hyperion (component: Installation and Configuration (Apache Ant)).   The supported version that is affected is 11.2.12. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hyperion Infrastructure Technology executes to compromise Oracle Hyperion Infrastructure Technology.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Hyperion Infrastructure Technology. CVSS 3.1 Base Score 5.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-36374</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4392V-11.2.12</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Hyperion Infrastructure Technology</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2775466.2</URL>
            <ProductID>P-4392V-11.2.12</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="54" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-36374</Title>
      <Notes>
         <Note Audience="All" Ordinal="54" Title="Details" Type="Details">Vulnerability in the Oracle Middleware Common Libraries and Tools product of Oracle Fusion Middleware (component: Third Party (Apache Ant)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Middleware Common Libraries and Tools executes to compromise Oracle Middleware Common Libraries and Tools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Middleware Common Libraries and Tools. CVSS 3.1 Base Score 5.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-36374</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Middleware Common Libraries and Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="55" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-3712</Title>
      <Notes>
         <Note Audience="All" Ordinal="55" Title="Details" Type="Details">Vulnerability in the Siebel CRM product of Oracle Siebel CRM (component: Siebel Core - Server Infrastructure (OpenSSL)).  Supported versions that are affected are 22.10 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Siebel CRM.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Siebel CRM accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Siebel CRM. CVSS 3.1 Base Score 7.4 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-3712</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9001V-22.10 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.4</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Siebel CRM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939854.1</URL>
            <ProductID>P-9001V-22.10 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="56" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-37519</Title>
      <Notes>
         <Note Audience="All" Ordinal="56" Title="Details" Type="Details">Vulnerability in the Oracle Communications User Data Repository product of Oracle Communications (component: Patches (memcached)).   The supported version that is affected is 12.6.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Communications User Data Repository executes to compromise Oracle Communications User Data Repository.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications User Data Repository. CVSS 3.1 Base Score 5.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-37519</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11108V-12.6.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications User Data Repository</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938448.1</URL>
            <ProductID>P-11108V-12.6.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="57" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-37533</Title>
      <Notes>
         <Note Audience="All" Ordinal="57" Title="Details" Type="Details">Vulnerability in the Oracle Middleware Common Libraries and Tools product of Oracle Fusion Middleware (component: Remote Diagnostic Agent (Apache Commons Net)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Middleware Common Libraries and Tools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Middleware Common Libraries and Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-37533</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Middleware Common Libraries and Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="58" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-37533</Title>
      <Notes>
         <Note Audience="All" Ordinal="58" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Integration Broker (Apache Commons Net)).  Supported versions that are affected are 8.58, 8.59 and  8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-37533</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="59" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-37695</Title>
      <Notes>
         <Note Audience="All" Ordinal="59" Title="Details" Type="Details">Vulnerability in the Siebel CRM product of Oracle Siebel CRM (component: Open UI (CKEditor)).  Supported versions that are affected are 21.10 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel CRM.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Siebel CRM, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Siebel CRM accessible data as well as  unauthorized read access to a subset of Siebel CRM accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-37695</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9011V-21.10 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Siebel CRM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939854.1</URL>
            <ProductID>P-9011V-21.10 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="60" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-3918</Title>
      <Notes>
         <Note Audience="All" Ordinal="60" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (JSON Schema)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-3918</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="61" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-4048</Title>
      <Notes>
         <Note Audience="All" Ordinal="61" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Machine Learning (OpenBLAS)).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 9.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-4048</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="62" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-40528</Title>
      <Notes>
         <Note Audience="All" Ordinal="62" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (libgcrypt)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-40528</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="63" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-40690</Title>
      <Notes>
         <Note Audience="All" Ordinal="63" Title="Details" Type="Details">Vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager (component: Load Testing for Web Apps (Apache Santuario XML Security For Java)).   The supported version that is affected is 13.3.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Application Testing Suite.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Application Testing Suite accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-40690</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4622V-13.3.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Application Testing Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923367.1</URL>
            <ProductID>P-4622V-13.3.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="64" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-40690</Title>
      <Notes>
         <Note Audience="All" Ordinal="64" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server (Apache CXF)).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-40690</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="65" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41183</Title>
      <Notes>
         <Note Audience="All" Ordinal="65" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Vision (jQueryUI)).  Supported versions that are affected are 5.5.0-5.5.10 and  6.0.0-6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Unified Assurance, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Unified Assurance accessible data as well as  unauthorized read access to a subset of Oracle Communications Unified Assurance accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41183</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="66" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="66" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (jQueryUI)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="67" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="67" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure (jQueryUI)).  Supported versions that are affected are 8.0.7.0, 8.0.8.0, 8.0.9.0,
8.1.0.0, 8.1.1.0, 8.1.2.0,
8.1.2.1 and  8.1.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Analytical Applications Infrastructure, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Analytical Applications Infrastructure accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-8.0.7.0</ProductID>
            <ProductID>P-5680V-8.0.8.0</ProductID>
            <ProductID>P-5680V-8.0.9.0</ProductID>
            <ProductID>P-5680V-8.1.0.0</ProductID>
            <ProductID>P-5680V-8.1.1.0</ProductID>
            <ProductID>P-5680V-8.1.2.0</ProductID>
            <ProductID>P-5680V-8.1.2.1</ProductID>
            <ProductID>P-5680V-8.1.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Analytical Applications Infrastructure</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939767.1</URL>
            <ProductID>P-5680V-8.0.7.0</ProductID>
            <ProductID>P-5680V-8.0.8.0</ProductID>
            <ProductID>P-5680V-8.0.9.0</ProductID>
            <ProductID>P-5680V-8.1.0.0</ProductID>
            <ProductID>P-5680V-8.1.1.0</ProductID>
            <ProductID>P-5680V-8.1.2.0</ProductID>
            <ProductID>P-5680V-8.1.2.1</ProductID>
            <ProductID>P-5680V-8.1.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="68" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="68" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Reconciliation Framework product of Oracle Financial Services Applications (component: Application (jQueryUI)).  Supported versions that are affected are 8.0.7.1.2 and  8.1.1.1.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Reconciliation Framework.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Analytical Applications Reconciliation Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Analytical Applications Reconciliation Framework accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Analytical Applications Reconciliation Framework accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5748V-8.0.7.1.2</ProductID>
            <ProductID>P-5748V-8.1.1.1.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Analytical Applications Reconciliation Framework</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939780.1</URL>
            <ProductID>P-5748V-8.0.7.1.2</ProductID>
            <ProductID>P-5748V-8.1.1.1.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="69" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="69" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Asset Liability Management product of Oracle Financial Services Applications (component: Application (jQueryUI)).   The supported version that is affected is 8.0.7.8.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Asset Liability Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Asset Liability Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Asset Liability Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Asset Liability Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5662V-8.0.7.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Asset Liability Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940045.1</URL>
            <ProductID>P-5662V-8.0.7.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="70" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="70" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Balance Computation Engine product of Oracle Financial Services Applications (component: Application (jQueryUI)).   The supported version that is affected is 8.1.1.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Balance Computation Engine.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Balance Computation Engine, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Balance Computation Engine accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Balance Computation Engine accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14246V-8.1.1.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Balance Computation Engine</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2942325.1</URL>
            <ProductID>P-14246V-8.1.1.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="71" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="71" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Balance Sheet Planning product of Oracle Financial Services Applications (component: Application (jQueryUI)).   The supported version that is affected is 8.0.8.1.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Balance Sheet Planning.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Balance Sheet Planning, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Balance Sheet Planning accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Balance Sheet Planning accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5663V-8.0.8.1.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Balance Sheet Planning</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940043.1</URL>
            <ProductID>P-5663V-8.0.8.1.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="72" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="72" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Data Governance for US Regulatory Reporting product of Oracle Financial Services Applications (component: Application (jQueryUI)).  Supported versions that are affected are 8.1.2.0 and  8.1.2.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Data Governance for US Regulatory Reporting.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Data Governance for US Regulatory Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Data Governance for US Regulatory Reporting accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Data Governance for US Regulatory Reporting accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11669V-8.1.2.0</ProductID>
            <ProductID>P-11669V-8.1.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Data Governance for US Regulatory Reporting</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940075.1</URL>
            <ProductID>P-11669V-8.1.2.0</ProductID>
            <ProductID>P-11669V-8.1.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="73" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="73" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Data Integration Hub product of Oracle Financial Services Applications (component: Application (jQueryUI)).  Supported versions that are affected are 8.1.0.1.4, 8.1.2.2.1 and  8.0.7.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Data Integration Hub.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Data Integration Hub, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Data Integration Hub accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Data Integration Hub accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11289V-8.1.0.1.4</ProductID>
            <ProductID>P-11289V-8.1.2.2.1</ProductID>
            <ProductID>P-11289V-8.0.7.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Data Integration Hub</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939782.1</URL>
            <ProductID>P-11289V-8.1.0.1.4</ProductID>
            <ProductID>P-11289V-8.1.2.2.1</ProductID>
            <ProductID>P-11289V-8.0.7.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="74" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="74" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management product of Oracle Financial Services Applications (component: Application (jQueryUI)).  Supported versions that are affected are 8.0.7.3.1 and  8.0.8.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13802V-8.0.7.3.1</ProductID>
            <ProductID>P-13802V-8.0.8.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939725.1</URL>
            <ProductID>P-13802V-8.0.7.3.1</ProductID>
            <ProductID>P-13802V-8.0.8.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="75" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="75" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Enterprise Financial Performance Analytics product of Oracle Financial Services Applications (component: Application (jQueryUI)).   The supported version that is affected is 8.0.7.8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Enterprise Financial Performance Analytics.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Enterprise Financial Performance Analytics, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Enterprise Financial Performance Analytics accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Enterprise Financial Performance Analytics accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4279V-8.0.7.8.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Enterprise Financial Performance Analytics</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940042.1</URL>
            <ProductID>P-4279V-8.0.7.8.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="76" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="76" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Funds Transfer Pricing product of Oracle Financial Services Applications (component: Application (jQueryUI)).   The supported version that is affected is 8.0.7.8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Funds Transfer Pricing.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Funds Transfer Pricing, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Funds Transfer Pricing accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Funds Transfer Pricing accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5659V-8.0.7.8.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Funds Transfer Pricing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940037.1</URL>
            <ProductID>P-5659V-8.0.7.8.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="77" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="77" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Loan Loss Forecasting and Provisioning product of Oracle Financial Services Applications (component: Application (jQueryUI)).  Supported versions that are affected are 8.0.7.8.1 and  8.0.8.2.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Loan Loss Forecasting and Provisioning.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Loan Loss Forecasting and Provisioning, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Loan Loss Forecasting and Provisioning accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Loan Loss Forecasting and Provisioning accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9332V-8.0.7.8.1</ProductID>
            <ProductID>P-9332V-8.0.8.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Loan Loss Forecasting and Provisioning</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939932.1</URL>
            <ProductID>P-9332V-8.0.7.8.1</ProductID>
            <ProductID>P-9332V-8.0.8.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="78" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="78" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Institutional Performance Analytics product of Oracle Financial Services Applications (component: Application (jQueryUI)).   The supported version that is affected is 8.0.7.8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Institutional Performance Analytics.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Institutional Performance Analytics, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Institutional Performance Analytics accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Institutional Performance Analytics accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10215V-8.0.7.8.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Institutional Performance Analytics</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940040.1</URL>
            <ProductID>P-10215V-8.0.7.8.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="79" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="79" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Liquidity Risk Measurement and Management product of Oracle Financial Services Applications (component: Application (jQueryUI)).  Supported versions that are affected are 8.0.7.3.1 and  8.0.8.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Liquidity Risk Measurement and Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Liquidity Risk Measurement and Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Liquidity Risk Measurement and Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Liquidity Risk Measurement and Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13797V-8.0.7.3.1</ProductID>
            <ProductID>P-13797V-8.0.8.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Liquidity Risk Measurement and Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939725.1</URL>
            <ProductID>P-13797V-8.0.7.3.1</ProductID>
            <ProductID>P-13797V-8.0.8.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="80" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="80" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Profitability Management product of Oracle Financial Services Applications (component: Application (jQueryUI)).   The supported version that is affected is 8.0.7.8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Profitability Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Profitability Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Profitability Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Profitability Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5658V-8.0.7.8.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Profitability Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940039.1</URL>
            <ProductID>P-5658V-8.0.7.8.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="81" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="81" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Retail Performance Analytics product of Oracle Financial Services Applications (component: Application (jQueryUI)).   The supported version that is affected is 8.0.7.8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Retail Performance Analytics.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Retail Performance Analytics, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Retail Performance Analytics accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Retail Performance Analytics accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10216V-8.0.7.8.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Retail Performance Analytics</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940041.1</URL>
            <ProductID>P-10216V-8.0.7.8.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="82" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="82" Title="Details" Type="Details">Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core (jQueryUI)).  Supported versions that are affected are Prior to 6.3.1.3 and  Prior to 7.0.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Health Sciences InForm.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Health Sciences InForm, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Health Sciences InForm accessible data as well as  unauthorized read access to a subset of Oracle Health Sciences InForm accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Health Sciences InForm</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="83" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41184</Title>
      <Notes>
         <Note Audience="All" Ordinal="83" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Network Management System product of Oracle Utilities Applications (component: User Interface (jQueryUI)).  Supported versions that are affected are 2.3.0.2, 2.4.0.1, 2.5.0.0 and  2.5.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Network Management System.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Utilities Network Management System, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Utilities Network Management System accessible data as well as  unauthorized read access to a subset of Oracle Utilities Network Management System accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41184</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2241V-2.3.0.2</ProductID>
            <ProductID>P-2241V-2.4.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.0</ProductID>
            <ProductID>P-2241V-2.5.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Utilities Network Management System</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936478.1</URL>
            <ProductID>P-2241V-2.3.0.2</ProductID>
            <ProductID>P-2241V-2.4.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.0</ProductID>
            <ProductID>P-2241V-2.5.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="84" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-41973</Title>
      <Notes>
         <Note Audience="All" Ordinal="84" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Interoperability SEC (Apache Mina)).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-41973</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="85" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-42575</Title>
      <Notes>
         <Note Audience="All" Ordinal="85" Title="Details" Type="Details">Vulnerability in the Oracle Commerce Platform product of Oracle Commerce (component: Platform (OWASP Java HTML Sanitizer )).  Supported versions that are affected are 11.3.0, 11.3.1 and  11.3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Platform.  Successful attacks of this vulnerability can result in takeover of Oracle Commerce Platform. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-42575</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9348V-11.3.0</ProductID>
            <ProductID>P-9348V-11.3.1</ProductID>
            <ProductID>P-9348V-11.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Commerce Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939844.1</URL>
            <ProductID>P-9348V-11.3.0</ProductID>
            <ProductID>P-9348V-11.3.1</ProductID>
            <ProductID>P-9348V-11.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="86" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-43859</Title>
      <Notes>
         <Note Audience="All" Ordinal="86" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Infrastructure (XStream)).  Supported versions that are affected are 2.7, 2.7.1, 2.8, 2.9, 2.9, 2.9.1, 3.0, 3.1, 3.2 and  4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Revenue Management and Billing. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-43859</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.7.1</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9.1</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Revenue Management and Billing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938972.1</URL>
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.7.1</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9.1</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="87" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-44832</Title>
      <Notes>
         <Note Audience="All" Ordinal="87" Title="Details" Type="Details">Vulnerability in the Oracle Retail Invoice Matching product of Oracle Retail Applications (component: Security (Apache Log4j)).  Supported versions that are affected are 15.0.3 and  16.0.3. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Retail Invoice Matching.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Invoice Matching. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-44832</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1810V-15.0.3</ProductID>
            <ProductID>P-1810V-16.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.6</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Invoice Matching</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-1810V-15.0.3</ProductID>
            <ProductID>P-1810V-16.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="88" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-44832</Title>
      <Notes>
         <Note Audience="All" Ordinal="88" Title="Details" Type="Details">Vulnerability in the Oracle Retail Price Management product of Oracle Retail Applications (component: Security (Apache Log4j)).  Supported versions that are affected are 14.1.3.2, 15.0.3.1 and  16.0.3. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Retail Price Management.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Price Management. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-44832</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1824V-14.1.3.2</ProductID>
            <ProductID>P-1824V-15.0.3.1</ProductID>
            <ProductID>P-1824V-16.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.6</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Price Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-1824V-14.1.3.2</ProductID>
            <ProductID>P-1824V-15.0.3.1</ProductID>
            <ProductID>P-1824V-16.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="89" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-46848</Title>
      <Notes>
         <Note Audience="All" Ordinal="89" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Policy product of Oracle Communications (component: Policy (GNU Libtasn1)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Policy.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications Cloud Native Core Policy accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Policy. CVSS 3.1 Base Score 9.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-46848</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Policy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938436.1</URL>
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="90" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-1292</Title>
      <Notes>
         <Note Audience="All" Ordinal="90" Title="Details" Type="Details">Vulnerability in the Oracle SD-WAN Edge product of Oracle Communications (component: Management (OpenSSL)).   The supported version that is affected is 9.1.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle SD-WAN Edge.  Successful attacks of this vulnerability can result in takeover of Oracle SD-WAN Edge. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-1292</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13940V-9.1.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SD-WAN Edge</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938444.1</URL>
            <ProductID>P-13940V-9.1.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="91" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-1471</Title>
      <Notes>
         <Note Audience="All" Ordinal="91" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Vision (SnakeYAML)).  Supported versions that are affected are 5.5.0-5.5.10 and  6.0.0-6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Unified Assurance. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-1471</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="92" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-1471</Title>
      <Notes>
         <Note Audience="All" Ordinal="92" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Inventory Management product of Oracle Communications Applications (component: TMF APIs (SnakeYAML)).  Supported versions that are affected are 7.4.1, 7.4.2 and  7.5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Unified Inventory Management.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Unified Inventory Management. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-1471</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4516V-7.4.1</ProductID>
            <ProductID>P-4516V-7.4.2</ProductID>
            <ProductID>P-4516V-7.5.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Inventory Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936066.1</URL>
            <ProductID>P-4516V-7.4.1</ProductID>
            <ProductID>P-4516V-7.4.2</ProductID>
            <ProductID>P-4516V-7.5.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="93" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-1471</Title>
      <Notes>
         <Note Audience="All" Ordinal="93" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Translational Research product of Oracle HealthCare Applications (component: DataStudio (SnakeYAML)).  Supported versions that are affected are 4.1.0 and  4.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Healthcare Translational Research.  Successful attacks of this vulnerability can result in takeover of Oracle Healthcare Translational Research. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-1471</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Translational Research</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="94" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-1471</Title>
      <Notes>
         <Note Audience="All" Ordinal="94" Title="Details" Type="Details">Vulnerability in the Oracle SD-WAN Edge product of Oracle Communications (component: Core (SnakeYAML)).   The supported version that is affected is 9.1.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SD-WAN Edge.  Successful attacks of this vulnerability can result in takeover of Oracle SD-WAN Edge. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-1471</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SD-WAN Edge</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938444.1</URL>
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="95" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-1471</Title>
      <Notes>
         <Note Audience="All" Ordinal="95" Title="Details" Type="Details">Security-in-Depth issue in Oracle SQL Developer (component: Installation (SnakeYAML)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-1471</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQL Developer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="96" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-1471</Title>
      <Notes>
         <Note Audience="All" Ordinal="96" Title="Details" Type="Details">Security-in-Depth issue in the Oracle SQLcl (SnakeYAML) component of Oracle Database Server. This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-1471</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13824V-21c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQLcl (SnakeYAML)</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13824V-21c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="97" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-1587</Title>
      <Notes>
         <Note Audience="All" Ordinal="97" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server (PCRE2)).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 9.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-1587</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="98" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-2048</Title>
      <Notes>
         <Note Audience="All" Ordinal="98" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending Process Management product of Oracle Financial Services Applications (component: Base (Eclipse Jetty)).  Supported versions that are affected are 14.4-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Corporate Lending Process Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Corporate Lending Process Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-2048</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13701V-14.4-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Corporate Lending Process Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13701V-14.4-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="99" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-2048</Title>
      <Notes>
         <Note Audience="All" Ordinal="99" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Eclipse Jetty)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-2048</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="100" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-21824</Title>
      <Notes>
         <Note Audience="All" Ordinal="100" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: E1 Dev Platform Tech - Cloud Manager (Node.js)).  Supported versions that are affected are Prior to 9.2.7.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools as well as  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 8.2 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-21824</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="101" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-2274</Title>
      <Notes>
         <Note Audience="All" Ordinal="101" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Enterprise Infrastructure SEC (OpenSSL)).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via JDENET to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-2274</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="102" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-2274</Title>
      <Notes>
         <Note Audience="All" Ordinal="102" Title="Details" Type="Details">Vulnerability in the JD Edwards World Security product of Oracle JD Edwards (component: World Software Security (OpenSSL)).   The supported version that is affected is A9.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards World Security.  Successful attacks of this vulnerability can result in takeover of JD Edwards World Security. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-2274</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4839V-A9.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards World Security</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4839V-A9.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="103" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22965</Title>
      <Notes>
         <Note Audience="All" Ordinal="103" Title="Details" Type="Details">Vulnerability in the Oracle Data Integrator product of Oracle Fusion Middleware (component: Third Party (Spring Framework)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Data Integrator.  Successful attacks of this vulnerability can result in takeover of Oracle Data Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22965</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2196V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Data Integrator</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-2196V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="104" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22965</Title>
      <Notes>
         <Note Audience="All" Ordinal="104" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration Operational Data Store for Life and Annuity product of Oracle Insurance Applications (component: Logger (Spring Framework)).   The supported version that is affected is 1.0.1.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration Operational Data Store for Life and Annuity.  Successful attacks of this vulnerability can result in takeover of Oracle Insurance Policy Administration Operational Data Store for Life and Annuity. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22965</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Insurance Policy Administration Operational Data Store for Life and Annuity</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-13339V-1.0.1.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="105" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22965</Title>
      <Notes>
         <Note Audience="All" Ordinal="105" Title="Details" Type="Details">Vulnerability in the Oracle Managed File Transfer product of Oracle Fusion Middleware (component: MFT Runtime Server (Spring Framework)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Managed File Transfer.  Successful attacks of this vulnerability can result in takeover of Oracle Managed File Transfer. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22965</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10198V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Managed File Transfer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-10198V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="106" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22971</Title>
      <Notes>
         <Note Audience="All" Ordinal="106" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending Process Management product of Oracle Financial Services Applications (component: Base (Spring Framework)).  Supported versions that are affected are 14.4-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending Process Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Corporate Lending Process Management. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22971</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13701V-14.4-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Corporate Lending Process Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13701V-14.4-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="107" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22971</Title>
      <Notes>
         <Note Audience="All" Ordinal="107" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations (Spring Framework)).  Supported versions that are affected are 18.0.0.12 and  19.0.0.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22971</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-18.0.0.12</ProductID>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Customer Management and Segmentation Foundation</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-13388V-18.0.0.12</ProductID>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="108" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22971</Title>
      <Notes>
         <Note Audience="All" Ordinal="108" Title="Details" Type="Details">Vulnerability in the Oracle Retail Fiscal Management product of Oracle Retail Applications (component: Security (Spring Framework)).   The supported version that is affected is 14.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Fiscal Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Fiscal Management. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22971</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9038V-14.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Fiscal Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-9038V-14.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="109" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22971</Title>
      <Notes>
         <Note Audience="All" Ordinal="109" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (Spring Framework)).  Supported versions that are affected are 17.0.6, 18.0.5, 19.0.4, 20.0.3 and  21.0.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Xstore Point of Service. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22971</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-17.0.6</ProductID>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Point of Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-11513V-17.0.6</ProductID>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="110" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22978</Title>
      <Notes>
         <Note Audience="All" Ordinal="110" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending Process Management product of Oracle Financial Services Applications (component: Base (Spring Security)).  Supported versions that are affected are 14.4-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Corporate Lending Process Management.  Successful attacks of this vulnerability can result in takeover of Oracle Banking Corporate Lending Process Management. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22978</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13701V-14.4-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Corporate Lending Process Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13701V-14.4-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="111" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-22979</Title>
      <Notes>
         <Note Audience="All" Ordinal="111" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending Process Management product of Oracle Financial Services Applications (component: Base (Spring Cloud Function)).  Supported versions that are affected are 14.4-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Corporate Lending Process Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Corporate Lending Process Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-22979</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13701V-14.4-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Corporate Lending Process Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13701V-14.4-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="112" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23181</Title>
      <Notes>
         <Note Audience="All" Ordinal="112" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (Apache Tomcat)).  Supported versions that are affected are 17.0.6, 18.0.5, 19.0.4, 20.0.3 and  21.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Retail Xstore Point of Service executes to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Xstore Point of Service. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23181</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-17.0.6</ProductID>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Point of Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-11513V-17.0.6</ProductID>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="113" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23219</Title>
      <Notes>
         <Note Audience="All" Ordinal="113" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (glibc)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23219</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="114" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23221</Title>
      <Notes>
         <Note Audience="All" Ordinal="114" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (H2 Database)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23221</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="115" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23305</Title>
      <Notes>
         <Note Audience="All" Ordinal="115" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Application Framework product of Oracle Utilities Applications (component: General (Apache Log4j)).   The supported version that is affected is 4.2.0.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Application Framework.  Successful attacks of this vulnerability can result in takeover of Oracle Utilities Application Framework. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23305</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2245V-4.2.0.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Utilities Application Framework</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936478.1</URL>
            <ProductID>P-2245V-4.2.0.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="116" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23437</Title>
      <Notes>
         <Note Audience="All" Ordinal="116" Title="Details" Type="Details">Vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager (component: Load Testing for Web Apps (Apache Xerces2 Java)).   The supported version that is affected is 13.3.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Application Testing Suite.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Application Testing Suite. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23437</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4622V-13.3.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Application Testing Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923367.1</URL>
            <ProductID>P-4622V-13.3.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="117" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23437</Title>
      <Notes>
         <Note Audience="All" Ordinal="117" Title="Details" Type="Details">Vulnerability in the Oracle Commerce Guided Search product of Oracle Commerce (component: Content Acquisition System, Workbench (Apache Xerces2 Java)).   The supported version that is affected is 11.3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Commerce Guided Search. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23437</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9633V-11.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Commerce Guided Search</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939844.1</URL>
            <ProductID>P-9633V-11.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="118" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23437</Title>
      <Notes>
         <Note Audience="All" Ordinal="118" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Infrastructure (Apache Xerces2 Java)).  Supported versions that are affected are 2.7, 2.7.1, 2.8, 2.9, 2.9.1, 3.0, 3.1, 3.2 and  4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Revenue Management and Billing. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23437</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.7.1</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9.1</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Revenue Management and Billing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938972.1</URL>
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.7.1</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9.1</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="119" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23437</Title>
      <Notes>
         <Note Audience="All" Ordinal="119" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (Apache Xerces2 Java)).   The supported version that is affected is 17.0.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Xstore Point of Service. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23437</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-17.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Point of Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-11513V-17.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="120" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23437</Title>
      <Notes>
         <Note Audience="All" Ordinal="120" Title="Details" Type="Details">Vulnerability in Oracle iLearning (component: Installation (Apache Xerces2 Java)).   The supported version that is affected is 6.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iLearning.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle iLearning. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23437</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-902V-6.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle iLearning</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939823.1</URL>
            <ProductID>P-902V-6.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="121" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23457</Title>
      <Notes>
         <Note Audience="All" Ordinal="121" Title="Details" Type="Details">Vulnerability in the Oracle GoldenGate Studio product of Oracle GoldenGate (component: GoldenGate Studio (Enterprise Security API)).   The supported version that is affected is Fusion Middleware: 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GoldenGate Studio.  Successful attacks of this vulnerability can result in takeover of Oracle GoldenGate Studio. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23457</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10945V-Fusion Middleware: 12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle GoldenGate Studio</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-10945V-Fusion Middleware: 12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="122" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-23491</Title>
      <Notes>
         <Note Audience="All" Ordinal="122" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Automated Test Suite product of Oracle Communications (component: Installation (Certifi)).  Supported versions that are affected are 22.3.1 and  22.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Automated Test Suite.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Cloud Native Core Automated Test Suite accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-23491</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Automated Test Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938415.1</URL>
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="123" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-24729</Title>
      <Notes>
         <Note Audience="All" Ordinal="123" Title="Details" Type="Details">Vulnerability in the Oracle Commerce Guided Search product of Oracle Commerce (component: Workbench (CKEditor)).   The supported version that is affected is 11.3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Commerce Guided Search. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-24729</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9633V-11.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Commerce Guided Search</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939844.1</URL>
            <ProductID>P-9633V-11.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="124" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-24839</Title>
      <Notes>
         <Note Audience="All" Ordinal="124" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Core Banking product of Oracle Financial Services Applications (component: Securities (NekoHTML)).  Supported versions that are affected are 11.6, 11.7, 11.8, 11.10 and  11.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Core Banking.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Core Banking. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-24839</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9101V-11.6</ProductID>
            <ProductID>P-9101V-11.7</ProductID>
            <ProductID>P-9101V-11.8</ProductID>
            <ProductID>P-9101V-11.10</ProductID>
            <ProductID>P-9101V-11.11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle FLEXCUBE Core Banking</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-9101V-11.6</ProductID>
            <ProductID>P-9101V-11.7</ProductID>
            <ProductID>P-9101V-11.8</ProductID>
            <ProductID>P-9101V-11.10</ProductID>
            <ProductID>P-9101V-11.11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="125" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25315</Title>
      <Notes>
         <Note Audience="All" Ordinal="125" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (LibExpat)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25315</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="126" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25315</Title>
      <Notes>
         <Note Audience="All" Ordinal="126" Title="Details" Type="Details">Vulnerability in the Oracle Communications Diameter Signaling Router product of Oracle Communications (component: Platform (LibExpat)).   The supported version that is affected is 8.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via XMPP to compromise Oracle Communications Diameter Signaling Router.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Diameter Signaling Router. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25315</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10899V-8.6.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Diameter Signaling Router</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938440.1</URL>
            <ProductID>P-10899V-8.6.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="127" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25647</Title>
      <Notes>
         <Note Audience="All" Ordinal="127" Title="Details" Type="Details">Vulnerability in the Oracle Banking APIs product of Oracle Financial Services Applications (component: IDM - Authentication (Google Gson)).  Supported versions that are affected are 18.2, 18.3, 19.1, 19.2, 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking APIs.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking APIs. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25647</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13676V-18.2</ProductID>
            <ProductID>P-13676V-18.3</ProductID>
            <ProductID>P-13676V-19.1</ProductID>
            <ProductID>P-13676V-19.2</ProductID>
            <ProductID>P-13676V-21.1</ProductID>
            <ProductID>P-13676V-22.1</ProductID>
            <ProductID>P-13676V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking APIs</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13676V-18.2</ProductID>
            <ProductID>P-13676V-18.3</ProductID>
            <ProductID>P-13676V-19.1</ProductID>
            <ProductID>P-13676V-19.2</ProductID>
            <ProductID>P-13676V-21.1</ProductID>
            <ProductID>P-13676V-22.1</ProductID>
            <ProductID>P-13676V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="128" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25647</Title>
      <Notes>
         <Note Audience="All" Ordinal="128" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending product of Oracle Financial Services Applications (component: Core (Google Gson)).  Supported versions that are affected are 14.0-14.3 and  14.5-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Corporate Lending. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25647</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-14.0-14.3</ProductID>
            <ProductID>P-12989V-14.5-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Corporate Lending</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12989V-14.0-14.3</ProductID>
            <ProductID>P-12989V-14.5-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="129" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25647</Title>
      <Notes>
         <Note Audience="All" Ordinal="129" Title="Details" Type="Details">Vulnerability in the Oracle Banking Digital Experience product of Oracle Financial Services Applications (component: UI General (Google Gson)).  Supported versions that are affected are 18.2, 18.3, 19.1, 19.2, 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Digital Experience.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Digital Experience. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25647</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Digital Experience</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="130" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25647</Title>
      <Notes>
         <Note Audience="All" Ordinal="130" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments product of Oracle Financial Services Applications (component: Infrastructure (Google Gson)).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Payments. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25647</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-14.5</ProductID>
            <ProductID>P-13011V-14.6</ProductID>
            <ProductID>P-13011V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Payments</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13011V-14.5</ProductID>
            <ProductID>P-13011V-14.6</ProductID>
            <ProductID>P-13011V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="131" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25647</Title>
      <Notes>
         <Note Audience="All" Ordinal="131" Title="Details" Type="Details">Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure (Google Gson)).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Trade Finance.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Trade Finance. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25647</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14134V-14.5</ProductID>
            <ProductID>P-14134V-14.6</ProductID>
            <ProductID>P-14134V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Trade Finance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-14134V-14.5</ProductID>
            <ProductID>P-14134V-14.6</ProductID>
            <ProductID>P-14134V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="132" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25647</Title>
      <Notes>
         <Note Audience="All" Ordinal="132" Title="Details" Type="Details">Vulnerability in the Oracle Banking Treasury Management product of Oracle Financial Services Applications (component: Infra Code (Google Gson)).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Treasury Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Treasury Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25647</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14133V-14.5</ProductID>
            <ProductID>P-14133V-14.6</ProductID>
            <ProductID>P-14133V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Treasury Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-14133V-14.5</ProductID>
            <ProductID>P-14133V-14.6</ProductID>
            <ProductID>P-14133V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="133" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25647</Title>
      <Notes>
         <Note Audience="All" Ordinal="133" Title="Details" Type="Details">Vulnerability in Oracle Blockchain Platform (component: BCS Console (Google Gson)).  Supported versions that are affected are Prior to 21.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Blockchain Platform.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Blockchain Platform. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25647</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="134" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25647</Title>
      <Notes>
         <Note Audience="All" Ordinal="134" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure (Google Gson)).  Supported versions that are affected are 14.0-14.3 and  14.5-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25647</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-14.0-14.3</ProductID>
            <ProductID>P-9052V-14.5-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle FLEXCUBE Universal Banking</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-9052V-14.0-14.3</ProductID>
            <ProductID>P-9052V-14.5-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="135" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-25857</Title>
      <Notes>
         <Note Audience="All" Ordinal="135" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Orchestrator product of Oracle JD Edwards (component: E1 IOT Orchestrator Security (jruby)).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Orchestrator.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Orchestrator. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-25857</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11681V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Orchestrator</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-11681V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="136" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-26336</Title>
      <Notes>
         <Note Audience="All" Ordinal="136" Title="Details" Type="Details">Security-in-Depth issue in Oracle SQL Developer (component: General Infrastructure (Apache POI)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-26336</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQL Developer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="137" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-27404</Title>
      <Notes>
         <Note Audience="All" Ordinal="137" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (FreeType)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-27404</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="138" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-27404</Title>
      <Notes>
         <Note Audience="All" Ordinal="138" Title="Details" Type="Details">Vulnerability in the Oracle Documaker product of Oracle Insurance Applications (component: Development Tools (FreeType)).  Supported versions that are affected are 12.6.0.0.0, 12.6.2.0.0-12.6.4.0.0, 12.7.0.0.0 and  12.7.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Documaker.  Successful attacks of this vulnerability can result in takeover of Oracle Documaker. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-27404</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5477V-12.6.0.0.0</ProductID>
            <ProductID>P-5477V-12.6.2.0.0-12.6.4.0.0</ProductID>
            <ProductID>P-5477V-12.7.0.0.0</ProductID>
            <ProductID>P-5477V-12.7.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Documaker</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-5477V-12.6.0.0.0</ProductID>
            <ProductID>P-5477V-12.6.2.0.0-12.6.4.0.0</ProductID>
            <ProductID>P-5477V-12.7.0.0.0</ProductID>
            <ProductID>P-5477V-12.7.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="139" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-27404</Title>
      <Notes>
         <Note Audience="All" Ordinal="139" Title="Details" Type="Details">Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Installation (FreeType)).   The supported version that is affected is 11.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Hyperion Financial Reporting.  Successful attacks of this vulnerability can result in takeover of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-27404</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8776V-11.2.12</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Hyperion Financial Reporting</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2775466.2</URL>
            <ProductID>P-8776V-11.2.12</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="140" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-27404</Title>
      <Notes>
         <Note Audience="All" Ordinal="140" Title="Details" Type="Details">Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Document Viewing using Outside In technology (FreeType)).  Supported versions that are affected are 18.8.0-18.8.26, 19.12.0-19.12.21, 20.12.0-20.12.18, 21.12.0-21.12.12 and  22.12.0-22.12.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management.  Successful attacks of this vulnerability can result in takeover of Primavera P6 Enterprise Project Portfolio Management. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-27404</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5579V-18.8.0-18.8.26</ProductID>
            <ProductID>P-5579V-19.12.0-19.12.21</ProductID>
            <ProductID>P-5579V-20.12.0-20.12.18</ProductID>
            <ProductID>P-5579V-21.12.0-21.12.12</ProductID>
            <ProductID>P-5579V-22.12.0-22.12.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Primavera P6 Enterprise Project Portfolio Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936154.1</URL>
            <ProductID>P-5579V-18.8.0-18.8.26</ProductID>
            <ProductID>P-5579V-19.12.0-19.12.21</ProductID>
            <ProductID>P-5579V-20.12.0-20.12.18</ProductID>
            <ProductID>P-5579V-21.12.0-21.12.12</ProductID>
            <ProductID>P-5579V-22.12.0-22.12.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="141" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-27404</Title>
      <Notes>
         <Note Audience="All" Ordinal="141" Title="Details" Type="Details">Vulnerability in the Primavera Unifier product of Oracle Construction and Engineering (component: Document Management (FreeType)).  Supported versions that are affected are 18.8.0-18.8.18, 19.12.0-19.12.16, 20.12.0-20.12.16, 21.12.0-21.12.14 and  22.12.0-22.12.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks of this vulnerability can result in takeover of Primavera Unifier. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-27404</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-18.8.0-18.8.18</ProductID>
            <ProductID>P-10354V-19.12.0-19.12.16</ProductID>
            <ProductID>P-10354V-20.12.0-20.12.16</ProductID>
            <ProductID>P-10354V-21.12.0-21.12.14</ProductID>
            <ProductID>P-10354V-22.12.0-22.12.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Primavera Unifier</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936154.1</URL>
            <ProductID>P-10354V-18.8.0-18.8.18</ProductID>
            <ProductID>P-10354V-19.12.0-19.12.16</ProductID>
            <ProductID>P-10354V-20.12.0-20.12.16</ProductID>
            <ProductID>P-10354V-21.12.0-21.12.14</ProductID>
            <ProductID>P-10354V-22.12.0-22.12.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="142" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-27782</Title>
      <Notes>
         <Note Audience="All" Ordinal="142" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (cURL)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-27782</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="143" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-28199</Title>
      <Notes>
         <Note Audience="All" Ordinal="143" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Border Controller product of Oracle Communications (component: Third Party (Dpdk)).  Supported versions that are affected are 9.0 and  9.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP/IP to compromise Oracle Communications Session Border Controller.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Session Border Controller as well as  unauthorized update, insert or delete access to some of Oracle Communications Session Border Controller accessible data and  unauthorized read access to a subset of Oracle Communications Session Border Controller accessible data. CVSS 3.1 Base Score 8.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-28199</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10750V-9.0</ProductID>
            <ProductID>P-10750V-9.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Border Controller</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938613.1</URL>
            <ProductID>P-10750V-9.0</ProductID>
            <ProductID>P-10750V-9.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="144" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-28327</Title>
      <Notes>
         <Note Audience="All" Ordinal="144" Title="Details" Type="Details">Vulnerability in Oracle Blockchain Platform (component: BCS Console (Golang Go)).  Supported versions that are affected are Prior to 21.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Blockchain Platform.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Blockchain Platform. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-28327</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="145" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-28738</Title>
      <Notes>
         <Note Audience="All" Ordinal="145" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: E1 Dev Platform Tech - Cloud Manager (Ruby)).  Supported versions that are affected are Prior to 9.2.7.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-28738</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="146" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-29078</Title>
      <Notes>
         <Note Audience="All" Ordinal="146" Title="Details" Type="Details">Security-in-Depth issue in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Vision (Embedded JavaScript Templates)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-29078</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-14597V-5.5.0-5.5.9</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.9</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="147" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-29577</Title>
      <Notes>
         <Note Audience="All" Ordinal="147" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Regulatory Reporting with AgileREPORTER product of Oracle Financial Services Applications (component: Application (AntiSamy)).   The supported version that is affected is 8.1.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Regulatory Reporting with AgileREPORTER.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Regulatory Reporting with AgileREPORTER, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Regulatory Reporting with AgileREPORTER accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Regulatory Reporting with AgileREPORTER accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-29577</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13077V-8.1.1.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Regulatory Reporting with AgileREPORTER</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940025.1</URL>
            <ProductID>P-13077V-8.1.1.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="148" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-29599</Title>
      <Notes>
         <Note Audience="All" Ordinal="148" Title="Details" Type="Details">Vulnerability in the Oracle Middleware Common Libraries and Tools product of Oracle Fusion Middleware (component: Third Party (Apache Maven)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Middleware Common Libraries and Tools.  Successful attacks of this vulnerability can result in takeover of Oracle Middleware Common Libraries and Tools. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-29599</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Middleware Common Libraries and Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="149" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31081</Title>
      <Notes>
         <Note Audience="All" Ordinal="149" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Core (HTTP::Daemon)).  Supported versions that are affected are 5.5.0-5.5.10 and  6.0.0-6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Unified Assurance accessible data as well as  unauthorized read access to a subset of Oracle Communications Unified Assurance accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31081</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="150" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31123</Title>
      <Notes>
         <Note Audience="All" Ordinal="150" Title="Details" Type="Details">Vulnerability in the Oracle Communications Convergent Charging Controller product of Oracle Communications Applications (component: Common fns (Grafana)).  Supported versions that are affected are 12.0.4-12.0.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Communications Convergent Charging Controller executes to compromise Oracle Communications Convergent Charging Controller.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Communications Convergent Charging Controller. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31123</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12985V-12.0.4-12.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Convergent Charging Controller</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936023.1</URL>
            <ProductID>P-12985V-12.0.4-12.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="151" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31123</Title>
      <Notes>
         <Note Audience="All" Ordinal="151" Title="Details" Type="Details">Vulnerability in the Oracle Communications Network Charging and Control product of Oracle Communications Applications (component: Common fns (Grafana)).  Supported versions that are affected are 12.0.4-12.0.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Communications Network Charging and Control executes to compromise Oracle Communications Network Charging and Control.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Communications Network Charging and Control. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31123</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4623V-12.0.4-12.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Network Charging and Control</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936023.1</URL>
            <ProductID>P-4623V-12.0.4-12.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="152" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31123</Title>
      <Notes>
         <Note Audience="All" Ordinal="152" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management product of Oracle Communications (component: Core (Grafana)).   The supported version that is affected is 12.6.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Communications Policy Management executes to compromise Oracle Communications Policy Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Communications Policy Management. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31123</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Policy Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938443.1</URL>
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="153" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31129</Title>
      <Notes>
         <Note Audience="All" Ordinal="153" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Moment.js)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31129</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="154" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31129</Title>
      <Notes>
         <Note Audience="All" Ordinal="154" Title="Details" Type="Details">Vulnerability in the Oracle Communications Services Gatekeeper product of Oracle Communications (component: Third Party (Moment.js)).   The supported version that is affected is 7.0.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Services Gatekeeper.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Services Gatekeeper. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31129</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5381V-7.0.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Services Gatekeeper</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938446.1</URL>
            <ProductID>P-5381V-7.0.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="155" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31160</Title>
      <Notes>
         <Note Audience="All" Ordinal="155" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Pod Admin (jQueryUI)).  Supported versions that are affected are 5.9.0.0.0 and  6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31160</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-5.9.0.0.0</ProductID>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-5.9.0.0.0</ProductID>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="156" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31160</Title>
      <Notes>
         <Note Audience="All" Ordinal="156" Title="Details" Type="Details">Vulnerability in the MySQL Enterprise Monitor product of Oracle MySQL (component: Monitoring: Server (jQueryUI)).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Enterprise Monitor.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Enterprise Monitor, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Enterprise Monitor accessible data as well as  unauthorized read access to a subset of MySQL Enterprise Monitor accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31160</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8480V-8.0.33 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Enterprise Monitor</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8480V-8.0.33 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="157" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31160</Title>
      <Notes>
         <Note Audience="All" Ordinal="157" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console (jQueryUI)).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle WebLogic Server executes to compromise Oracle WebLogic Server.  While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as  unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 3.9 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31160</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.9</BaseScore>
            <Vector>AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="158" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31630</Title>
      <Notes>
         <Note Audience="All" Ordinal="158" Title="Details" Type="Details">Vulnerability in the Oracle Communications Diameter Signaling Router product of Oracle Communications (component: Platform (PHP)).   The supported version that is affected is 8.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Communications Diameter Signaling Router executes to compromise Oracle Communications Diameter Signaling Router.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications Diameter Signaling Router accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Diameter Signaling Router. CVSS 3.1 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31630</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10899V-8.6.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.1</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Diameter Signaling Router</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938440.1</URL>
            <ProductID>P-10899V-8.6.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="159" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31630</Title>
      <Notes>
         <Note Audience="All" Ordinal="159" Title="Details" Type="Details">Vulnerability in the Oracle SD-WAN Aware product of Oracle Communications (component: Management (PHP)).   The supported version that is affected is 9.0.1.6.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle SD-WAN Aware executes to compromise Oracle SD-WAN Aware.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle SD-WAN Aware accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle SD-WAN Aware. CVSS 3.1 Base Score 7.1 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31630</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13941V-9.0.1.6.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.1</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SD-WAN Aware</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938423.1</URL>
            <ProductID>P-13941V-9.0.1.6.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="160" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31692</Title>
      <Notes>
         <Note Audience="All" Ordinal="160" Title="Details" Type="Details">Vulnerability in the Oracle Communications Element Manager product of Oracle Communications (component: Authentication (Spring Security)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via LDAP to compromise Oracle Communications Element Manager.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Element Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31692</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Element Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938441.1</URL>
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="161" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31692</Title>
      <Notes>
         <Note Audience="All" Ordinal="161" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Report Manager product of Oracle Communications (component: Authentication (Spring Security)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via LDAP to compromise Oracle Communications Session Report Manager.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Session Report Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31692</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Report Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938447.1</URL>
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="162" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-31692</Title>
      <Notes>
         <Note Audience="All" Ordinal="162" Title="Details" Type="Details">Vulnerability in the Oracle SD-WAN Edge product of Oracle Communications (component: Internal tools (Spring Security)).   The supported version that is affected is 9.1.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SD-WAN Edge.  Successful attacks of this vulnerability can result in takeover of Oracle SD-WAN Edge. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-31692</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SD-WAN Edge</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938444.1</URL>
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="163" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="163" Title="Details" Type="Details">Vulnerability in the Oracle Banking Corporate Lending product of Oracle Financial Services Applications (component: Core (Google Protobuf-Java)).  Supported versions that are affected are 14.0-14.3 and  14.5-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Corporate Lending.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Corporate Lending. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12989V-14.0-14.3</ProductID>
            <ProductID>P-12989V-14.5-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Corporate Lending</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12989V-14.0-14.3</ProductID>
            <ProductID>P-12989V-14.5-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="164" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="164" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments product of Oracle Financial Services Applications (component: Infrastructure (Google Protobuf-Java)).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Payments. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-14.5</ProductID>
            <ProductID>P-13011V-14.6</ProductID>
            <ProductID>P-13011V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Payments</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13011V-14.5</ProductID>
            <ProductID>P-13011V-14.6</ProductID>
            <ProductID>P-13011V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="165" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="165" Title="Details" Type="Details">Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure (Google Protobuf-Java)).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Trade Finance.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Trade Finance. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14134V-14.5</ProductID>
            <ProductID>P-14134V-14.6</ProductID>
            <ProductID>P-14134V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Trade Finance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-14134V-14.5</ProductID>
            <ProductID>P-14134V-14.6</ProductID>
            <ProductID>P-14134V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="166" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="166" Title="Details" Type="Details">Vulnerability in the Oracle Banking Treasury Management product of Oracle Financial Services Applications (component: Infra Code (Google Protobuf-Java)).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Treasury Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Treasury Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14133V-14.5</ProductID>
            <ProductID>P-14133V-14.6</ProductID>
            <ProductID>P-14133V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Treasury Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-14133V-14.5</ProductID>
            <ProductID>P-14133V-14.6</ProductID>
            <ProductID>P-14133V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="167" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="167" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Google Protobuf-Java)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="168" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="168" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management product of Oracle Communications (component: Core (Google Protobuf-Java)).   The supported version that is affected is 12.6.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Policy Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Policy Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938443.1</URL>
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="169" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="169" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Core (Google Protobuf-Java)).  Supported versions that are affected are 5.5.0-5.5.9 and  6.0.0-6.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Unified Assurance. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.9</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.9</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="170" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="170" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure (Google Protobuf-Java)).  Supported versions that are affected are 14.0-14.3 and  14.5-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-14.0-14.3</ProductID>
            <ProductID>P-9052V-14.5-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle FLEXCUBE Universal Banking</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-9052V-14.0-14.3</ProductID>
            <ProductID>P-9052V-14.5-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="171" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="171" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Translational Research product of Oracle HealthCare Applications (component: DataStudio (Google Protobuf-Java)).  Supported versions that are affected are 4.1.0 and  4.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Healthcare Translational Research.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Healthcare Translational Research. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Translational Research</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="172" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3171</Title>
      <Notes>
         <Note Audience="All" Ordinal="172" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations (Google Protobuf-Java)).  Supported versions that are affected are 18.0.0.12 and  19.0.0.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3171</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-18.0.0.12</ProductID>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Customer Management and Segmentation Foundation</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-13388V-18.0.0.12</ProductID>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="173" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-32215</Title>
      <Notes>
         <Note Audience="All" Ordinal="173" Title="Details" Type="Details">Vulnerability in Oracle Blockchain Platform (component: BCS Console (Node.js)).  Supported versions that are affected are Prior to 21.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Blockchain Platform.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Blockchain Platform accessible data as well as  unauthorized read access to a subset of Oracle Blockchain Platform accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-32215</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="174" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-32215</Title>
      <Notes>
         <Note Audience="All" Ordinal="174" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: BI Lifecycle (Node.js)).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Business Intelligence Enterprise Edition accessible data as well as  unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-32215</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="175" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-33980</Title>
      <Notes>
         <Note Audience="All" Ordinal="175" Title="Details" Type="Details">Vulnerability in the Oracle Middleware Common Libraries and Tools product of Oracle Fusion Middleware (component: Third Party (Apache Commons Configuration)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Middleware Common Libraries and Tools.  Successful attacks of this vulnerability can result in takeover of Oracle Middleware Common Libraries and Tools. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-33980</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Middleware Common Libraries and Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="176" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-33980</Title>
      <Notes>
         <Note Audience="All" Ordinal="176" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (Apache Commons Configuration)).  Supported versions that are affected are 18.0.5, 19.0.4, 20.0.3 and  21.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Xstore Point of Service. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-33980</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Point of Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="177" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-33980</Title>
      <Notes>
         <Note Audience="All" Ordinal="177" Title="Details" Type="Details">Security-in-Depth issue in the Oracle Utilities Network Management System product of Oracle Utilities Applications (component: System Wide (Apache Commons Configuration)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-33980</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-2241V-2.3.0.2</ProductID>
            <ProductID>P-2241V-2.4.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.0</ProductID>
            <ProductID>P-2241V-2.5.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Utilities Network Management System</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936478.1</URL>
            <ProductID>P-2241V-2.3.0.2</ProductID>
            <ProductID>P-2241V-2.4.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.0</ProductID>
            <ProductID>P-2241V-2.5.0.1</ProductID>
            <ProductID>P-2241V-2.5.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="178" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-34169</Title>
      <Notes>
         <Note Audience="All" Ordinal="178" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: JAXP (Apache Xalan-J)).   The supported version that is affected is 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Intelligence Enterprise Edition and  unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-34169</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="179" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-34169</Title>
      <Notes>
         <Note Audience="All" Ordinal="179" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Infrastructure (Apache Xalan-Java)).  Supported versions that are affected are 2.7, 2.7.1, 2.8, 2.9, 2.9.1, 3.0, 3.1, 3.2 and  4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-34169</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.7.1</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9.1</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Revenue Management and Billing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938972.1</URL>
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.7.1</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9.1</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="180" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-34169</Title>
      <Notes>
         <Note Audience="All" Ordinal="180" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Integration Broker (Apache Xalan-Java)).   The supported version that is affected is 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-34169</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.58</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.58</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="181" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-34305</Title>
      <Notes>
         <Note Audience="All" Ordinal="181" Title="Details" Type="Details">Vulnerability in the Oracle Managed File Transfer product of Oracle Fusion Middleware (component: MFT Runtime Server (Apache Tomcat)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Managed File Transfer.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Managed File Transfer, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Managed File Transfer accessible data as well as  unauthorized read access to a subset of Oracle Managed File Transfer accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-34305</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10198V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Managed File Transfer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-10198V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="182" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-3479</Title>
      <Notes>
         <Note Audience="All" Ordinal="182" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Translational Research product of Oracle HealthCare Applications (component: DataStudio (NSS)).  Supported versions that are affected are 4.1.0 and  4.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Healthcare Translational Research.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Healthcare Translational Research. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-3479</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Translational Research</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="183" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-34917</Title>
      <Notes>
         <Note Audience="All" Ordinal="183" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Apache Kafka)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-34917</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="184" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-35737</Title>
      <Notes>
         <Note Audience="All" Ordinal="184" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Policy product of Oracle Communications (component: Policy (SQLite)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Policy.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Policy. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-35737</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Policy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938436.1</URL>
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="185" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="185" Title="Details" Type="Details">Vulnerability in the Oracle Banking Digital Experience product of Oracle Financial Services Applications (component: UI General (jsoup)).  Supported versions that are affected are 18.2, 18.3, 19.1, 19.2, 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Digital Experience.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Digital Experience, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Digital Experience accessible data as well as  unauthorized read access to a subset of Oracle Banking Digital Experience accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Digital Experience</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="186" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="186" Title="Details" Type="Details">Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure (jsoup)).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Trade Finance.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Trade Finance, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Trade Finance accessible data as well as  unauthorized read access to a subset of Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14134V-14.5</ProductID>
            <ProductID>P-14134V-14.6</ProductID>
            <ProductID>P-14134V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Trade Finance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-14134V-14.5</ProductID>
            <ProductID>P-14134V-14.6</ProductID>
            <ProductID>P-14134V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="187" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="187" Title="Details" Type="Details">Vulnerability in the Oracle Banking Treasury Management product of Oracle Financial Services Applications (component: Infrastructure (jsoup)).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Treasury Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Treasury Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Treasury Management accessible data as well as  unauthorized read access to a subset of Oracle Banking Treasury Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14133V-14.5</ProductID>
            <ProductID>P-14133V-14.6</ProductID>
            <ProductID>P-14133V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Treasury Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-14133V-14.5</ProductID>
            <ProductID>P-14133V-14.6</ProductID>
            <ProductID>P-14133V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="188" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="188" Title="Details" Type="Details">Vulnerability in the Oracle Business Process Management Suite product of Oracle Fusion Middleware (component: Installer (jsoup)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Process Management Suite.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Process Management Suite, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Business Process Management Suite accessible data as well as  unauthorized read access to a subset of Oracle Business Process Management Suite accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5325V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Process Management Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5325V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="189" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="189" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure (jsoup)).  Supported versions that are affected are 14.0-14.3 and  14.5-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-14.0-14.3</ProductID>
            <ProductID>P-9052V-14.5-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle FLEXCUBE Universal Banking</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-9052V-14.0-14.3</ProductID>
            <ProductID>P-9052V-14.5-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="190" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="190" Title="Details" Type="Details">Vulnerability in the Oracle Middleware Common Libraries and Tools product of Oracle Fusion Middleware (component: Third Party (jsoup)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Middleware Common Libraries and Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Middleware Common Libraries and Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Middleware Common Libraries and Tools accessible data as well as  unauthorized read access to a subset of Oracle Middleware Common Libraries and Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Middleware Common Libraries and Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="191" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="191" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Elastic Search (jsoup)).  Supported versions that are affected are 8.58, 8.59 and  8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="192" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="192" Title="Details" Type="Details">Vulnerability in the Primavera Unifier product of Oracle Construction and Engineering (component: User Interface (jsoup)).  Supported versions that are affected are 18.8.0-18.8.18, 19.12.0-19.12.16, 20.12.0-20.12.16, 21.12.0-21.12.14 and  22.12.0-22.12.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Unifier, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Primavera Unifier accessible data as well as  unauthorized read access to a subset of Primavera Unifier accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-18.8.0-18.8.18</ProductID>
            <ProductID>P-10354V-19.12.0-19.12.16</ProductID>
            <ProductID>P-10354V-20.12.0-20.12.16</ProductID>
            <ProductID>P-10354V-21.12.0-21.12.14</ProductID>
            <ProductID>P-10354V-22.12.0-22.12.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Primavera Unifier</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936154.1</URL>
            <ProductID>P-10354V-18.8.0-18.8.18</ProductID>
            <ProductID>P-10354V-19.12.0-19.12.16</ProductID>
            <ProductID>P-10354V-20.12.0-20.12.16</ProductID>
            <ProductID>P-10354V-21.12.0-21.12.14</ProductID>
            <ProductID>P-10354V-22.12.0-22.12.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="193" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="193" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations (jsoup)).  Supported versions that are affected are 18.0.0.12 and  19.0.0.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Retail Customer Management and Segmentation Foundation, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data as well as  unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-18.0.0.12</ProductID>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Customer Management and Segmentation Foundation</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-13388V-18.0.0.12</ProductID>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="194" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36033</Title>
      <Notes>
         <Note Audience="All" Ordinal="194" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Portal product of Oracle Fusion Middleware (component: Security Framework (jsoup)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Portal.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Portal, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebCenter Portal accessible data as well as  unauthorized read access to a subset of Oracle WebCenter Portal accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36033</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1696V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebCenter Portal</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1696V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="195" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-36760</Title>
      <Notes>
         <Note Audience="All" Ordinal="195" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Core (Apache HTTP Server)).  Supported versions that are affected are 5.5.0-5.5.10 and  6.0.0-6.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  While the vulnerability is in Oracle Communications Unified Assurance, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in takeover of Oracle Communications Unified Assurance. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-36760</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="196" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="196" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server (zlib)).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in takeover of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="197" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="197" Title="Details" Type="Details">Vulnerability in the Oracle Communications Core Session Manager product of Oracle Communications (component: Routing (zlib)).  Supported versions that are affected are 8.45 and  9.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Core Session Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Core Session Manager as well as  unauthorized update, insert or delete access to some of Oracle Communications Core Session Manager accessible data and  unauthorized read access to a subset of Oracle Communications Core Session Manager accessible data. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10754V-8.45</ProductID>
            <ProductID>P-10754V-9.15</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Core Session Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938621.1</URL>
            <ProductID>P-10754V-8.45</ProductID>
            <ProductID>P-10754V-9.15</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="198" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="198" Title="Details" Type="Details">Security-in-Depth issue in the Oracle Communications IP Service Activator product of Oracle Communications Applications (component: Other (zlib)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-2261V-7.4.0</ProductID>
            <ProductID>P-2261V-7.5.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications IP Service Activator</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936021.1</URL>
            <ProductID>P-2261V-7.4.0</ProductID>
            <ProductID>P-2261V-7.5.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="199" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="199" Title="Details" Type="Details">Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine (glibc)).   The supported version that is affected is 5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP/IP to compromise Oracle Communications Operations Monitor.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Operations Monitor. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10761V-5.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Operations Monitor</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938442.1</URL>
            <ProductID>P-10761V-5.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="200" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="200" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management product of Oracle Communications (component: Core (zlib)).   The supported version that is affected is 12.6.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Policy Management. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Policy Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938443.1</URL>
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="201" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="201" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Border Controller product of Oracle Communications (component: Routing (zlib)).  Supported versions that are affected are 9.0 and  9.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Session Border Controller.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Session Border Controller as well as  unauthorized update, insert or delete access to some of Oracle Communications Session Border Controller accessible data and  unauthorized read access to a subset of Oracle Communications Session Border Controller accessible data. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10750V-9.0</ProductID>
            <ProductID>P-10750V-9.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Border Controller</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938613.1</URL>
            <ProductID>P-10750V-9.0</ProductID>
            <ProductID>P-10750V-9.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="202" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="202" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Router product of Oracle Communications (component: Routing (zlib)).  Supported versions that are affected are 9.0 and  9.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Session Router.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Session Router as well as  unauthorized update, insert or delete access to some of Oracle Communications Session Router accessible data and  unauthorized read access to a subset of Oracle Communications Session Router accessible data. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10752V-9.0</ProductID>
            <ProductID>P-10752V-9.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Router</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938613.1</URL>
            <ProductID>P-10752V-9.0</ProductID>
            <ProductID>P-10752V-9.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="203" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="203" Title="Details" Type="Details">Vulnerability in the Oracle Communications Subscriber-Aware Load Balancer product of Oracle Communications (component: Routing (zlib)).  Supported versions that are affected are 9.0 and  9.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Subscriber-Aware Load Balancer.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Subscriber-Aware Load Balancer as well as  unauthorized update, insert or delete access to some of Oracle Communications Subscriber-Aware Load Balancer accessible data and  unauthorized read access to a subset of Oracle Communications Subscriber-Aware Load Balancer accessible data. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10766V-9.0</ProductID>
            <ProductID>P-10766V-9.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Subscriber-Aware Load Balancer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938613.1</URL>
            <ProductID>P-10766V-9.0</ProductID>
            <ProductID>P-10766V-9.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="204" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="204" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Communications Broker product of Oracle Communications (component: Routing (zlib)).  Supported versions that are affected are 3.3 and  4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Enterprise Communications Broker.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Enterprise Communications Broker as well as  unauthorized update, insert or delete access to some of Oracle Enterprise Communications Broker accessible data and  unauthorized read access to a subset of Oracle Enterprise Communications Broker accessible data. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10758V-3.3</ProductID>
            <ProductID>P-10758V-4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Enterprise Communications Broker</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938617.1</URL>
            <ProductID>P-10758V-3.3</ProductID>
            <ProductID>P-10758V-4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="205" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="205" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Session Router product of Oracle Communications (component: Routing (zlib)).   The supported version that is affected is 9.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Enterprise Session Router.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Enterprise Session Router as well as  unauthorized update, insert or delete access to some of Oracle Enterprise Session Router accessible data and  unauthorized read access to a subset of Oracle Enterprise Session Router accessible data. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14615V-9.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Enterprise Session Router</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938613.1</URL>
            <ProductID>P-14615V-9.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="206" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="206" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: SSL Module (zlib)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server.  Successful attacks of this vulnerability can result in takeover of Oracle HTTP Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle HTTP Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1042V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="207" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="207" Title="Details" Type="Details">Security-in-Depth issue in the MySQL Cluster product of Oracle MySQL (component: Cluster: General (zlib)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-8479V-7.5.29 and prior</ProductID>
            <ProductID>P-8479V-7.6.25 and prior</ProductID>
            <ProductID>P-8479V-8.0.31 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Cluster</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8479V-7.5.29 and prior</ProductID>
            <ProductID>P-8479V-7.6.25 and prior</ProductID>
            <ProductID>P-8479V-8.0.31 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="208" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="208" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB (zlib)).  Supported versions that are affected are 5.7.41 and prior and  8.0.31 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.31 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.31 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="209" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37434</Title>
      <Notes>
         <Note Audience="All" Ordinal="209" Title="Details" Type="Details">Vulnerability in the Oracle Retail Predictive Application Server product of Oracle Retail Applications (component: RPAS Server (zlib)).  Supported versions that are affected are 15.0.3 and  16.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Predictive Application Server.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Predictive Application Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37434</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1823V-15.0.3</ProductID>
            <ProductID>P-1823V-16.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Predictive Application Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-1823V-15.0.3</ProductID>
            <ProductID>P-1823V-16.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="210" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-37865</Title>
      <Notes>
         <Note Audience="All" Ordinal="210" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Automated Test Suite product of Oracle Communications (component: Installation (Apache Ivy)).  Supported versions that are affected are 22.3.1 and  22.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Automated Test Suite.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Cloud Native Core Automated Test Suite accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Automated Test Suite. CVSS 3.1 Base Score 9.1 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-37865</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Automated Test Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938415.1</URL>
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="211" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-38752</Title>
      <Notes>
         <Note Audience="All" Ordinal="211" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (SnakeYAML)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-38752</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="212" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-38752</Title>
      <Notes>
         <Note Audience="All" Ordinal="212" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Service Communication Proxy product of Oracle Communications (component: Install/Upgrade (SnakeYAML)).  Supported versions that are affected are 22.3.0 and  22.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Service Communication Proxy.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Service Communication Proxy. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-38752</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14117V-22.3.0</ProductID>
            <ProductID>P-14117V-22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Service Communication Proxy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2942394.1</URL>
            <ProductID>P-14117V-22.3.0</ProductID>
            <ProductID>P-14117V-22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="213" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-38752</Title>
      <Notes>
         <Note Audience="All" Ordinal="213" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Model Management and Governance product of Oracle Financial Services Applications (component: Application (SnakeYAML)).  Supported versions that are affected are 8.1.0.0 and  8.1.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Model Management and Governance.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Model Management and Governance. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-38752</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14276V-8.1.0.0</ProductID>
            <ProductID>P-14276V-8.1.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Model Management and Governance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939794.1</URL>
            <ProductID>P-14276V-8.1.0.0</ProductID>
            <ProductID>P-14276V-8.1.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="214" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-38752</Title>
      <Notes>
         <Note Audience="All" Ordinal="214" Title="Details" Type="Details">Vulnerability in the Oracle SD-WAN Edge product of Oracle Communications (component: Internal tools (SnakeYAML)).   The supported version that is affected is 9.1.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle SD-WAN Edge.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle SD-WAN Edge. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-38752</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SD-WAN Edge</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938444.1</URL>
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="215" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-39135</Title>
      <Notes>
         <Note Audience="All" Ordinal="215" Title="Details" Type="Details">Security-in-Depth issue in Oracle Essbase (component: Build (Apache Calcite)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-39135</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-4379V-21.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Essbase</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-4379V-21.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="216" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-39271</Title>
      <Notes>
         <Note Audience="All" Ordinal="216" Title="Details" Type="Details">Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security (Traefik)).   The supported version that is affected is 7.4.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Order and Service Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Order and Service Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-39271</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2270V-7.4.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Order and Service Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936012.1</URL>
            <ProductID>P-2270V-7.4.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="217" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40146</Title>
      <Notes>
         <Note Audience="All" Ordinal="217" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Infrastructure (Apache Batik)).  Supported versions that are affected are 2.7, 2.7.1, 2.8, 2.9, 2.9.1, 3.0, 3.1, 3.2 and  4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40146</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.7.1</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9.1</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Revenue Management and Billing</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938972.1</URL>
            <ProductID>P-5322V-2.7</ProductID>
            <ProductID>P-5322V-2.7.1</ProductID>
            <ProductID>P-5322V-2.8</ProductID>
            <ProductID>P-5322V-2.9</ProductID>
            <ProductID>P-5322V-2.9.1</ProductID>
            <ProductID>P-5322V-3.0</ProductID>
            <ProductID>P-5322V-3.1</ProductID>
            <ProductID>P-5322V-3.2</ProductID>
            <ProductID>P-5322V-4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="218" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40149</Title>
      <Notes>
         <Note Audience="All" Ordinal="218" Title="Details" Type="Details">Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Build Scripts (Jettison)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Access Manager. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40149</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5565V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Access Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5565V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="219" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40151</Title>
      <Notes>
         <Note Audience="All" Ordinal="219" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Binding Support Function product of Oracle Communications (component: Install/Upgrade (XStream)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Binding Support Function.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Binding Support Function. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40151</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Binding Support Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938417.1</URL>
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="220" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40151</Title>
      <Notes>
         <Note Audience="All" Ordinal="220" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Portal product of Oracle Fusion Middleware (component: Security Framework (XStream)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Portal.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebCenter Portal. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40151</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1696V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebCenter Portal</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1696V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="221" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40152</Title>
      <Notes>
         <Note Audience="All" Ordinal="221" Title="Details" Type="Details">Vulnerability in the Oracle Commerce Guided Search product of Oracle Commerce (component: Content Acquisition System (Apache CXF)).   The supported version that is affected is 11.3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Commerce Guided Search. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40152</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9633V-11.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Commerce Guided Search</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939844.1</URL>
            <ProductID>P-9633V-11.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="222" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40152</Title>
      <Notes>
         <Note Audience="All" Ordinal="222" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples (XStream)).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40152</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="223" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40304</Title>
      <Notes>
         <Note Audience="All" Ordinal="223" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (libxml2)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40304</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="224" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40304</Title>
      <Notes>
         <Note Audience="All" Ordinal="224" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Binding Support Function product of Oracle Communications (component: Install/Upgrade (libxml2)).  Supported versions that are affected are 22.4.0-22.4.4, 23.1.0 and  23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Communications Cloud Native Core Binding Support Function executes to compromise Oracle Communications Cloud Native Core Binding Support Function.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Binding Support Function. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40304</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0</ProductID>
            <ProductID>P-14121V-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Binding Support Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938417.1</URL>
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0</ProductID>
            <ProductID>P-14121V-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="225" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40304</Title>
      <Notes>
         <Note Audience="All" Ordinal="225" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Network Function Cloud Native Environment product of Oracle Communications (component: Configuration (libxml2)).   The supported version that is affected is 22.4.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Communications Cloud Native Core Network Function Cloud Native Environment executes to compromise Oracle Communications Cloud Native Core Network Function Cloud Native Environment.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Network Function Cloud Native Environment. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40304</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14125V-22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Network Function Cloud Native Environment</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938434.1</URL>
            <ProductID>P-14125V-22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="226" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-40304</Title>
      <Notes>
         <Note Audience="All" Ordinal="226" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: SSL Module (libxml2)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle HTTP Server executes to compromise Oracle HTTP Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle HTTP Server. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-40304</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle HTTP Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1042V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="227" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41715</Title>
      <Notes>
         <Note Audience="All" Ordinal="227" Title="Details" Type="Details">Security-in-Depth issue in Oracle TimesTen In-Memory Database (component: Oracle TimesTen In-Memory Database (Go)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41715</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-1870V-Prior to 22.1.1.7.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle TimesTen In-Memory Database</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1870V-Prior to 22.1.1.7.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="228" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41881</Title>
      <Notes>
         <Note Audience="All" Ordinal="228" Title="Details" Type="Details">Vulnerability in the Oracle Banking Digital Experience product of Oracle Financial Services Applications (component: UI General (Netty)).  Supported versions that are affected are 18.2, 18.3, 19.1, 19.2, 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Digital Experience.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Digital Experience. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41881</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Digital Experience</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="229" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41881</Title>
      <Notes>
         <Note Audience="All" Ordinal="229" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Netty)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41881</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="230" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41881</Title>
      <Notes>
         <Note Audience="All" Ordinal="230" Title="Details" Type="Details">Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Core (Netty)).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Coherence.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Coherence. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41881</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2545V-12.2.1.4.0</ProductID>
            <ProductID>P-2545V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Coherence</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-2545V-12.2.1.4.0</ProductID>
            <ProductID>P-2545V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="231" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41881</Title>
      <Notes>
         <Note Audience="All" Ordinal="231" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Binding Support Function product of Oracle Communications (component: Policy (Netty)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Binding Support Function.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Binding Support Function. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41881</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Binding Support Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938417.1</URL>
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="232" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41881</Title>
      <Notes>
         <Note Audience="All" Ordinal="232" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Elastic Search (Netty)).  Supported versions that are affected are 8.58, 8.59 and  8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41881</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="233" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41881</Title>
      <Notes>
         <Note Audience="All" Ordinal="233" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Portal product of Oracle Fusion Middleware (component: Security Framework (Netty)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Portal.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebCenter Portal. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41881</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1696V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebCenter Portal</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1696V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="234" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41966</Title>
      <Notes>
         <Note Audience="All" Ordinal="234" Title="Details" Type="Details">Vulnerability in the Oracle SOA Suite product of Oracle Fusion Middleware (component: Security (XStream)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SOA Suite.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle SOA Suite. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1675V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SOA Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1675V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="235" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41966</Title>
      <Notes>
         <Note Audience="All" Ordinal="235" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Binding Support Function product of Oracle Communications (component: Policy (XStream)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Binding Support Function.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Binding Support Function. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Binding Support Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938417.1</URL>
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="236" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41966</Title>
      <Notes>
         <Note Audience="All" Ordinal="236" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Console product of Oracle Communications (component: Configuration (XStream)).  Supported versions that are affected are 22.4.0 and  22.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Console.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Console. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14250V-22.4.0</ProductID>
            <ProductID>P-14250V-22.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Console</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938418.1</URL>
            <ProductID>P-14250V-22.4.0</ProductID>
            <ProductID>P-14250V-22.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="237" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41966</Title>
      <Notes>
         <Note Audience="All" Ordinal="237" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management product of Oracle Communications (component: Core (XStream)).   The supported version that is affected is 12.6.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Policy Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Policy Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938443.1</URL>
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="238" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41966</Title>
      <Notes>
         <Note Audience="All" Ordinal="238" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Inventory Management product of Oracle Communications Applications (component: Security Component (XStream)).  Supported versions that are affected are 7.4.0, 7.4.1, 7.4.2 and  7.5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Unified Inventory Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Unified Inventory Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4516V-7.4.0</ProductID>
            <ProductID>P-4516V-7.4.1</ProductID>
            <ProductID>P-4516V-7.4.2</ProductID>
            <ProductID>P-4516V-7.5.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Inventory Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936066.1</URL>
            <ProductID>P-4516V-7.4.0</ProductID>
            <ProductID>P-4516V-7.4.1</ProductID>
            <ProductID>P-4516V-7.4.2</ProductID>
            <ProductID>P-4516V-7.5.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="239" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41966</Title>
      <Notes>
         <Note Audience="All" Ordinal="239" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Manager Ops Center product of Oracle Enterprise Manager (component: Networking (XStream)).   The supported version that is affected is 12.4.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Enterprise Manager Ops Center. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.4.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Enterprise Manager Ops Center</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923367.1</URL>
            <ProductID>P-9835V-12.4.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="240" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41966</Title>
      <Notes>
         <Note Audience="All" Ordinal="240" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (XStream)).  Supported versions that are affected are 17.0.6, 18.0.5, 19.0.4, 20.0.3 and  21.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Xstore Point of Service. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-17.0.6</ProductID>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Point of Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-11513V-17.0.6</ProductID>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="241" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-41966</Title>
      <Notes>
         <Note Audience="All" Ordinal="241" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Application Framework product of Oracle Utilities Applications (component: General (XStream)).  Supported versions that are affected are 4.2.0.3.0, 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0 and  4.5.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Application Framework.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Utilities Application Framework. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-41966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2245V-4.2.0.3.0</ProductID>
            <ProductID>P-2245V-4.3.0.1.0-4.3.0.6.0</ProductID>
            <ProductID>P-2245V-4.4.0.0.0</ProductID>
            <ProductID>P-2245V-4.4.0.2.0</ProductID>
            <ProductID>P-2245V-4.4.0.3.0</ProductID>
            <ProductID>P-2245V-4.5.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Utilities Application Framework</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936478.1</URL>
            <ProductID>P-2245V-4.2.0.3.0</ProductID>
            <ProductID>P-2245V-4.3.0.1.0-4.3.0.6.0</ProductID>
            <ProductID>P-2245V-4.4.0.0.0</ProductID>
            <ProductID>P-2245V-4.4.0.2.0</ProductID>
            <ProductID>P-2245V-4.4.0.3.0</ProductID>
            <ProductID>P-2245V-4.5.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="242" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="242" Title="Details" Type="Details">Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Security (jackson-databind)).   The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Agile PLM. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4461V-9.3.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Agile PLM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939856.1</URL>
            <ProductID>P-4461V-9.3.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="243" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="243" Title="Details" Type="Details">Vulnerability in the Oracle Banking Digital Experience product of Oracle Financial Services Applications (component: UI General (jackson-databind)).  Supported versions that are affected are 18.2, 18.3, 19.1, 19.2, 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Digital Experience.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Digital Experience. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Digital Experience</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="244" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="244" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server (jackson-databind)).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="245" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="245" Title="Details" Type="Details">Vulnerability in the Oracle Business Process Management Suite product of Oracle Fusion Middleware (component: Installer (jackson-databind)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Process Management Suite.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Business Process Management Suite. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5325V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Process Management Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5325V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="246" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="246" Title="Details" Type="Details">Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Core (jackson-databind)).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Coherence.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Coherence. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2545V-12.2.1.4.0</ProductID>
            <ProductID>P-2545V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Coherence</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-2545V-12.2.1.4.0</ProductID>
            <ProductID>P-2545V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="247" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="247" Title="Details" Type="Details">Vulnerability in the Oracle Commerce Guided Search product of Oracle Commerce (component: Content Acquisition System, Workbench (jackson-databind)).   The supported version that is affected is 11.3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Commerce Guided Search. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9633V-11.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Commerce Guided Search</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939844.1</URL>
            <ProductID>P-9633V-11.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="248" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="248" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Service Communication Proxy product of Oracle Communications (component: Install/Upgrade (jackson-databind)).   The supported version that is affected is 22.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Service Communication Proxy.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Service Communication Proxy. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14117V-22.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Service Communication Proxy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2942394.1</URL>
            <ProductID>P-14117V-22.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="249" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="249" Title="Details" Type="Details">Vulnerability in the Oracle Communications Element Manager product of Oracle Communications (component: BEServer (jackson-databind)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Element Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Element Manager. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Element Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938441.1</URL>
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="250" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="250" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management product of Oracle Communications (component: Core (jackson-databind)).   The supported version that is affected is 12.6.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Policy Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Policy Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Policy Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938443.1</URL>
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="251" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="251" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Report Manager product of Oracle Communications (component: BEServer (jackson-databind)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Session Report Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Session Report Manager. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Report Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938447.1</URL>
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="252" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="252" Title="Details" Type="Details">Vulnerability in the Oracle Documaker product of Oracle Insurance Applications (component: Development Tools (jackson-databind)).  Supported versions that are affected are 12.6.0.0.0, 12.6.2.0.0-12.6.4.0.0, 12.7.0.0.0 and  12.7.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Documaker.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Documaker. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5477V-12.6.0.0.0</ProductID>
            <ProductID>P-5477V-12.6.2.0.0-12.6.4.0.0</ProductID>
            <ProductID>P-5477V-12.7.0.0.0</ProductID>
            <ProductID>P-5477V-12.7.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Documaker</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-5477V-12.6.0.0.0</ProductID>
            <ProductID>P-5477V-12.6.2.0.0-12.6.4.0.0</ProductID>
            <ProductID>P-5477V-12.7.0.0.0</ProductID>
            <ProductID>P-5477V-12.7.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="253" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="253" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure (jackson-databind)).  Supported versions that are affected are 8.0.7.0, 8.0.8.0, 8.0.9.0,
8.1.0.0, 8.1.1.0, 8.1.2.0,
8.1.2.1 and  8.1.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-8.0.7.0</ProductID>
            <ProductID>P-5680V-8.0.8.0</ProductID>
            <ProductID>P-5680V-8.0.9.0</ProductID>
            <ProductID>P-5680V-8.1.0.0</ProductID>
            <ProductID>P-5680V-8.1.1.0</ProductID>
            <ProductID>P-5680V-8.1.2.0</ProductID>
            <ProductID>P-5680V-8.1.2.1</ProductID>
            <ProductID>P-5680V-8.1.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Analytical Applications Infrastructure</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939767.1</URL>
            <ProductID>P-5680V-8.0.7.0</ProductID>
            <ProductID>P-5680V-8.0.8.0</ProductID>
            <ProductID>P-5680V-8.0.9.0</ProductID>
            <ProductID>P-5680V-8.1.0.0</ProductID>
            <ProductID>P-5680V-8.1.1.0</ProductID>
            <ProductID>P-5680V-8.1.2.0</ProductID>
            <ProductID>P-5680V-8.1.2.1</ProductID>
            <ProductID>P-5680V-8.1.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="254" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="254" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Behavior Detection Platform product of Oracle Financial Services Applications (component: Application (jackson-databind)).  Supported versions that are affected are 8.0.8.1,  8.1.1.1, 8.1.2.3 and  8.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Behavior Detection Platform.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Behavior Detection Platform. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9190V-8.0.8.1</ProductID>
            <ProductID>P-9190V-8.1.1.1</ProductID>
            <ProductID>P-9190V-8.1.2.3</ProductID>
            <ProductID>P-9190V-8.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Behavior Detection Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936356.1</URL>
            <ProductID>P-9190V-8.0.8.1</ProductID>
            <ProductID>P-9190V-8.1.1.1</ProductID>
            <ProductID>P-9190V-8.1.2.3</ProductID>
            <ProductID>P-9190V-8.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="255" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="255" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Enterprise Case Management product of Oracle Financial Services Applications (component: Application (jackson-databind)).  Supported versions that are affected are 8.1.2.4, 8.1.2.3, 8.1.1.1 and  8.0.8.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Enterprise Case Management.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Enterprise Case Management. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13545V-8.1.2.4</ProductID>
            <ProductID>P-13545V-8.1.2.3</ProductID>
            <ProductID>P-13545V-8.1.1.1</ProductID>
            <ProductID>P-13545V-8.0.8.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Enterprise Case Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936337.1</URL>
            <ProductID>P-13545V-8.1.2.4</ProductID>
            <ProductID>P-13545V-8.1.2.3</ProductID>
            <ProductID>P-13545V-8.1.1.1</ProductID>
            <ProductID>P-13545V-8.0.8.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="256" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="256" Title="Details" Type="Details">Vulnerability in Oracle GoldenGate (component: Oracle GoldenGate (jackson-databind)).  Supported versions that are affected are Prior to 19.1.0.0.230418 and  Prior to 21.10.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle GoldenGate.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GoldenGate. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5757V-Prior to 19.1.0.0.230418</ProductID>
            <ProductID>P-5757V-Prior to 21.10.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle GoldenGate</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-5757V-Prior to 19.1.0.0.230418</ProductID>
            <ProductID>P-5757V-Prior to 21.10.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="257" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="257" Title="Details" Type="Details">Vulnerability in Oracle Graph Server and Client (component: Packaging (jackson-databind)).  Supported versions that are affected are Prior to 23.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Graph Server and Client.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Graph Server and Client. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14069V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Graph Server and Client</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-14069V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="258" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="258" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Translational Research product of Oracle HealthCare Applications (component: User Interface (jackson-databind)).  Supported versions that are affected are 4.1.0 and  4.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Healthcare Translational Research.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Healthcare Translational Research. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Translational Research</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="259" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="259" Title="Details" Type="Details">Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: Installer (jackson-databind)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Identity Manager. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1980V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Identity Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1980V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="260" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="260" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC (jackson-databind)).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="261" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="261" Title="Details" Type="Details">Vulnerability in Oracle NoSQL Database (component: Administration (jackson-databind)).  Supported versions that are affected are Prior to 19.5.32. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle NoSQL Database.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle NoSQL Database. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13373V-Prior to 19.5.32</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle NoSQL Database</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13373V-Prior to 19.5.32</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="262" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="262" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations (jackson-databind)).  Supported versions that are affected are 18.0.0.12 and  19.0.0.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-18.0.0.12</ProductID>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Customer Management and Segmentation Foundation</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-13388V-18.0.0.12</ProductID>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="263" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="263" Title="Details" Type="Details">Vulnerability in the Oracle Retail Merchandising System product of Oracle Retail Applications (component: Foundation (jackson-databind)).   The supported version that is affected is 15.0.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Merchandising System.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Merchandising System. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1816V-15.0.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Merchandising System</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-1816V-15.0.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="264" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="264" Title="Details" Type="Details">Vulnerability in the Oracle Retail Sales Audit product of Oracle Retail Applications (component: others (jackson-databind)).   The supported version that is affected is 15.0.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Sales Audit.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Sales Audit. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1834V-15.0.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Sales Audit</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-1834V-15.0.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="265" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="265" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (jackson-databind)).  Supported versions that are affected are 17.0.6, 18.0.5, 19.0.4, 20.0.3 and  21.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Xstore Point of Service. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-17.0.6</ProductID>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Point of Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-11513V-17.0.6</ProductID>
            <ProductID>P-11513V-18.0.5</ProductID>
            <ProductID>P-11513V-19.0.4</ProductID>
            <ProductID>P-11513V-20.0.3</ProductID>
            <ProductID>P-11513V-21.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="266" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="266" Title="Details" Type="Details">Vulnerability in the Oracle SD-WAN Edge product of Oracle Communications (component: Internal tools (jackson-databind)).   The supported version that is affected is 9.1.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle SD-WAN Edge.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle SD-WAN Edge. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SD-WAN Edge</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938444.1</URL>
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="267" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="267" Title="Details" Type="Details">Vulnerability in Oracle SQL Developer (component: Infrastructure (jackson-databind)).  Supported versions that are affected are Prior to 23.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SQL Developer.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle SQL Developer. CVSS 3.1 Base Score 5.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQL Developer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="268" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="268" Title="Details" Type="Details">Vulnerability in the Siebel CRM product of Oracle Siebel CRM (component: EAI (jackson-databind)).  Supported versions that are affected are 23.2 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel CRM.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Siebel CRM. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9011V-23.2 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Siebel CRM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939854.1</URL>
            <ProductID>P-9011V-23.2 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="269" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42003</Title>
      <Notes>
         <Note Audience="All" Ordinal="269" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Portal product of Oracle Fusion Middleware (component: Security Framework (jackson-databind)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Portal.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebCenter Portal. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1696V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebCenter Portal</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1696V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="270" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42004</Title>
      <Notes>
         <Note Audience="All" Ordinal="270" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Core (Apache Kafka)).  Supported versions that are affected are 5.5.0-5.5.10 and  6.0.0-6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Unified Assurance. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42004</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="271" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42252</Title>
      <Notes>
         <Note Audience="All" Ordinal="271" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Model Management and Governance product of Oracle Financial Services Applications (component: Application (Apache Tomcat)).  Supported versions that are affected are 8.1.0.0 and  8.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Model Management and Governance.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Model Management and Governance accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42252</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14276V-8.1.0.0</ProductID>
            <ProductID>P-14276V-8.1.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Model Management and Governance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939794.1</URL>
            <ProductID>P-14276V-8.1.0.0</ProductID>
            <ProductID>P-14276V-8.1.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="272" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42252</Title>
      <Notes>
         <Note Audience="All" Ordinal="272" Title="Details" Type="Details">Vulnerability in the Management Cloud Engine product of Oracle Communications (component: BEServer (Apache Tomcat)).   The supported version that is affected is 22.1.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Management Cloud Engine.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Management Cloud Engine accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42252</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14252V-22.1.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Management Cloud Engine</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2942213.1</URL>
            <ProductID>P-14252V-22.1.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="273" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42252</Title>
      <Notes>
         <Note Audience="All" Ordinal="273" Title="Details" Type="Details">Vulnerability in the Siebel CRM product of Oracle Siebel CRM (component: Services (Apache Tomcat)).  Supported versions that are affected are 23.2 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel CRM.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Siebel CRM accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42252</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9001V-23.2 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Siebel CRM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939854.1</URL>
            <ProductID>P-9001V-23.2 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="274" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="274" Title="Details" Type="Details">Security-in-Depth issue in Oracle Blockchain Platform (component: BCS Console (Apache Commons Text)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Blockchain Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13444V-Prior to 21.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="275" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="275" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: BI Application Archive (Apache Commons Text)).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in takeover of Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="276" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="276" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Compliance Studio product of Oracle Financial Services Applications (component: Application (Apache Commons Text)).   The supported version that is affected is 8.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Compliance Studio.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Compliance Studio. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14392V-8.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Compliance Studio</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936394.1</URL>
            <ProductID>P-14392V-8.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="277" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="277" Title="Details" Type="Details">Security-in-Depth issue in Oracle Graph Server and Client (component: PGX Java Client (Apache Commons Text)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-14069V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Graph Server and Client</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-14069V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="278" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="278" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Foundation product of Oracle HealthCare Applications (component: Self Service Analytics (Apache Commons Text)).  Supported versions that are affected are 8.1.0, 8.1.1, 8.2.0, 8.2.1 and  8.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Healthcare Foundation.  Successful attacks of this vulnerability can result in takeover of Oracle Healthcare Foundation. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12950V-8.1.0</ProductID>
            <ProductID>P-12950V-8.1.1</ProductID>
            <ProductID>P-12950V-8.2.0</ProductID>
            <ProductID>P-12950V-8.2.1</ProductID>
            <ProductID>P-12950V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Foundation</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-12950V-8.1.0</ProductID>
            <ProductID>P-12950V-8.1.1</ProductID>
            <ProductID>P-12950V-8.2.0</ProductID>
            <ProductID>P-12950V-8.2.1</ProductID>
            <ProductID>P-12950V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="279" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="279" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Master Person Index product of Oracle HealthCare Applications (component: Self Service Analytics (Apache Commons Text)).  Supported versions that are affected are 5.0.0-5.0.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Healthcare Master Person Index.  Successful attacks of this vulnerability can result in takeover of Oracle Healthcare Master Person Index. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8575V-5.0.0-5.0.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Master Person Index</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-8575V-5.0.0-5.0.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="280" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="280" Title="Details" Type="Details">Vulnerability in the Oracle Retail Merchandising System product of Oracle Retail Applications (component: Security (Apache Commons Text)).  Supported versions that are affected are 16.0.2 and  16.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Merchandising System.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Merchandising System. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1816V-16.0.2</ProductID>
            <ProductID>P-1816V-16.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Merchandising System</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-1816V-16.0.2</ProductID>
            <ProductID>P-1816V-16.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="281" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="281" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Office Cloud Service product of Oracle Retail Applications (component: DB, Perf, etc (Apache Commons Text)).  Supported versions that are affected are 18.0.5, 19.0.4, 20.0.3 and  21.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Office Cloud Service.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Xstore Office Cloud Service. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13551V-18.0.5</ProductID>
            <ProductID>P-13551V-19.0.4</ProductID>
            <ProductID>P-13551V-20.0.3</ProductID>
            <ProductID>P-13551V-21.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Office Cloud Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-13551V-18.0.5</ProductID>
            <ProductID>P-13551V-19.0.4</ProductID>
            <ProductID>P-13551V-20.0.3</ProductID>
            <ProductID>P-13551V-21.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="282" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="282" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Point of Sale (Apache Commons Text)).  Supported versions that are affected are 18.0.5, 19.0.4, 20.0.3 and  21.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Xstore Point of Service. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513(Point of Sale)V-18.0.5</ProductID>
            <ProductID>P-11513(Point of Sale)V-19.0.4</ProductID>
            <ProductID>P-11513(Point of Sale)V-20.0.3</ProductID>
            <ProductID>P-11513(Point of Sale)V-21.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Point of Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-11513(Point of Sale)V-18.0.5</ProductID>
            <ProductID>P-11513(Point of Sale)V-19.0.4</ProductID>
            <ProductID>P-11513(Point of Sale)V-20.0.3</ProductID>
            <ProductID>P-11513(Point of Sale)V-21.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="283" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="283" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (Apache Commons Text)).  Supported versions that are affected are 18.0.5, 19.0.4, 20.0.3 and  21.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Xstore Point of Service. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513(Xenvironment)V-18.0.5</ProductID>
            <ProductID>P-11513(Xenvironment)V-19.0.4</ProductID>
            <ProductID>P-11513(Xenvironment)V-20.0.3</ProductID>
            <ProductID>P-11513(Xenvironment)V-21.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Xstore Point of Service</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-11513(Xenvironment)V-18.0.5</ProductID>
            <ProductID>P-11513(Xenvironment)V-19.0.4</ProductID>
            <ProductID>P-11513(Xenvironment)V-20.0.3</ProductID>
            <ProductID>P-11513(Xenvironment)V-21.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="284" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42889</Title>
      <Notes>
         <Note Audience="All" Ordinal="284" Title="Details" Type="Details">Security-in-Depth issue in Oracle SQL Developer (component: Installation (Apache Commons Text)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42889</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-1875V-Prior to 22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQL Developer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1875V-Prior to 22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="285" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42890</Title>
      <Notes>
         <Note Audience="All" Ordinal="285" Title="Details" Type="Details">Vulnerability in the Oracle Banking Digital Experience product of Oracle Financial Services Applications (component: UI General (Apache Batik)).  Supported versions that are affected are 18.2, 18.3, 19.1, 19.2, 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Digital Experience.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Banking Digital Experience accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42890</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Digital Experience</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="286" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42890</Title>
      <Notes>
         <Note Audience="All" Ordinal="286" Title="Details" Type="Details">Vulnerability in the Oracle Business Process Management Suite product of Oracle Fusion Middleware (component: Installer (Apache Batik)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Process Management Suite.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Business Process Management Suite accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42890</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5325V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Process Management Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5325V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="287" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42890</Title>
      <Notes>
         <Note Audience="All" Ordinal="287" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure (Apache Batik)).  Supported versions that are affected are 8.0.7.0, 8.0.8.0, 8.0.9.0,
8.1.0.0, 8.1.1.0, 8.1.2.0,
8.1.2.1 and  8.1.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42890</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-8.0.7.0</ProductID>
            <ProductID>P-5680V-8.0.8.0</ProductID>
            <ProductID>P-5680V-8.0.9.0</ProductID>
            <ProductID>P-5680V-8.1.0.0</ProductID>
            <ProductID>P-5680V-8.1.1.0</ProductID>
            <ProductID>P-5680V-8.1.2.0</ProductID>
            <ProductID>P-5680V-8.1.2.1</ProductID>
            <ProductID>P-5680V-8.1.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Analytical Applications Infrastructure</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939767.1</URL>
            <ProductID>P-5680V-8.0.7.0</ProductID>
            <ProductID>P-5680V-8.0.8.0</ProductID>
            <ProductID>P-5680V-8.0.9.0</ProductID>
            <ProductID>P-5680V-8.1.0.0</ProductID>
            <ProductID>P-5680V-8.1.1.0</ProductID>
            <ProductID>P-5680V-8.1.2.0</ProductID>
            <ProductID>P-5680V-8.1.2.1</ProductID>
            <ProductID>P-5680V-8.1.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="288" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42890</Title>
      <Notes>
         <Note Audience="All" Ordinal="288" Title="Details" Type="Details">Vulnerability in the Oracle Middleware Common Libraries and Tools product of Oracle Fusion Middleware (component: Third Party (Apache Batik)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Middleware Common Libraries and Tools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Middleware Common Libraries and Tools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42890</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Middleware Common Libraries and Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="289" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42890</Title>
      <Notes>
         <Note Audience="All" Ordinal="289" Title="Details" Type="Details">Security-in-Depth issue in Oracle SQL Developer (component: General Infrastructure (Apache Batik)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42890</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQL Developer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="290" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42898</Title>
      <Notes>
         <Note Audience="All" Ordinal="290" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Security Edge Protection Proxy product of Oracle Communications (component: Installation and Configuration (Kerberos)).  Supported versions that are affected are 23.1.0 and  22.4.1. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Oracle Communications Cloud Native Core Security Edge Protection Proxy.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Security Edge Protection Proxy. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42898</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14123V-23.1.0</ProductID>
            <ProductID>P-14123V-22.4.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Security Edge Protection Proxy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938437.1</URL>
            <ProductID>P-14123V-23.1.0</ProductID>
            <ProductID>P-14123V-22.4.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="291" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42898</Title>
      <Notes>
         <Note Audience="All" Ordinal="291" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Translational Research product of Oracle HealthCare Applications (component: DataStudio (Kerberos)).  Supported versions that are affected are 4.1.0 and  4.1.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Healthcare Translational Research.  Successful attacks of this vulnerability can result in takeover of Oracle Healthcare Translational Research. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42898</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Translational Research</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="292" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-42916</Title>
      <Notes>
         <Note Audience="All" Ordinal="292" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core (cURL)).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-42916</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="293" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-43401</Title>
      <Notes>
         <Note Audience="All" Ordinal="293" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Automated Test Suite product of Oracle Communications (component: Installation (Jenkins Script Security)).  Supported versions that are affected are 22.3.1 and  22.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Automated Test Suite.  While the vulnerability is in Oracle Communications Cloud Native Core Automated Test Suite, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Automated Test Suite. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-43401</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.9</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Automated Test Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938415.1</URL>
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="294" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-43402</Title>
      <Notes>
         <Note Audience="All" Ordinal="294" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Automated Test Suite product of Oracle Communications (component: Installation (Jenkins)).  Supported versions that are affected are 22.3.1 and  22.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Automated Test Suite.  While the vulnerability is in Oracle Communications Cloud Native Core Automated Test Suite, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Automated Test Suite. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-43402</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.9</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Automated Test Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938415.1</URL>
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="295" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-43548</Title>
      <Notes>
         <Note Audience="All" Ordinal="295" Title="Details" Type="Details">Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: JS module (Node.js)).  Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster.  Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-43548</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8479V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Cluster</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8479V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="296" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-43551</Title>
      <Notes>
         <Note Audience="All" Ordinal="296" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: SSL Module (cURL)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle HTTP Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-43551</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle HTTP Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1042V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="297" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-43551</Title>
      <Notes>
         <Note Audience="All" Ordinal="297" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging (cURL)).  Supported versions that are affected are 5.7.41 and prior and  8.0.32 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-43551</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="298" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-43680</Title>
      <Notes>
         <Note Audience="All" Ordinal="298" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Currency Transaction Reporting product of Oracle Financial Services Applications (component: Application (LibExpat)).  Supported versions that are affected are 8.0.8.1.0,  8.1.1.1.0, 8.1.2.3.0 and  8.1.2.4.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Currency Transaction Reporting.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Currency Transaction Reporting. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-43680</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9784V-8.0.8.1.0</ProductID>
            <ProductID>P-9784V-8.1.1.1.0</ProductID>
            <ProductID>P-9784V-8.1.2.3.0</ProductID>
            <ProductID>P-9784V-8.1.2.4.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Currency Transaction Reporting</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936356.1</URL>
            <ProductID>P-9784V-8.0.8.1.0</ProductID>
            <ProductID>P-9784V-8.1.1.1.0</ProductID>
            <ProductID>P-9784V-8.1.2.3.0</ProductID>
            <ProductID>P-9784V-8.1.2.4.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="299" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-43680</Title>
      <Notes>
         <Note Audience="All" Ordinal="299" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Behavior Detection Platform product of Oracle Financial Services Applications (component: Third Party (LibExpat)).  Supported versions that are affected are 8.0.8.1, 8.1.1.1, 8.1.2.3 and  8.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Behavior Detection Platform.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Behavior Detection Platform. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-43680</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9190V-8.0.8.1</ProductID>
            <ProductID>P-9190V-8.1.1.1</ProductID>
            <ProductID>P-9190V-8.1.2.3</ProductID>
            <ProductID>P-9190V-8.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Behavior Detection Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936356.1</URL>
            <ProductID>P-9190V-8.0.8.1</ProductID>
            <ProductID>P-9190V-8.1.1.1</ProductID>
            <ProductID>P-9190V-8.1.2.3</ProductID>
            <ProductID>P-9190V-8.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="300" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-43680</Title>
      <Notes>
         <Note Audience="All" Ordinal="300" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition product of Oracle Financial Services Applications (component: Application (LibExpat)).   The supported version that is affected is 8.0.8.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-43680</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13789V-8.0.8.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936336.1</URL>
            <ProductID>P-13789V-8.0.8.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="301" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-4415</Title>
      <Notes>
         <Note Audience="All" Ordinal="301" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Policy product of Oracle Communications (component: Policy (systemd)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Cloud Native Core Policy executes to compromise Oracle Communications Cloud Native Core Policy.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications Cloud Native Core Policy accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-4415</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Policy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938436.1</URL>
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="302" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="302" Title="Details" Type="Details">Vulnerability in the Oracle Business Process Management Suite product of Oracle Fusion Middleware (component: Installer (Apache Mina SSHD)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Process Management Suite.  Successful attacks of this vulnerability can result in takeover of Oracle Business Process Management Suite. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5325V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Process Management Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5325V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="303" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="303" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Automated Test Suite product of Oracle Communications (component: Installation (Apache Mina SSHD)).  Supported versions that are affected are 22.3.1 and  22.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Automated Test Suite.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Automated Test Suite. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Automated Test Suite</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938415.1</URL>
            <ProductID>P-14488V-22.3.1</ProductID>
            <ProductID>P-14488V-22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="304" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="304" Title="Details" Type="Details">Vulnerability in the Oracle Communications Element Manager product of Oracle Communications (component: BEServer (Apache Mina SSHD)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via SSH to compromise Oracle Communications Element Manager.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Element Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Element Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938441.1</URL>
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="305" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="305" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Report Manager product of Oracle Communications (component: BEServer (Apache Mina SSHD)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via SSH to compromise Oracle Communications Session Report Manager.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Session Report Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Report Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938447.1</URL>
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="306" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="306" Title="Details" Type="Details">Security-in-Depth issue in Oracle GoldenGate (component: Oracle GoldenGate (Apache Mina SSHD)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-5757V-Prior to 19.1.0.0.230418</ProductID>
            <ProductID>P-5757V-Prior to 21.10.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle GoldenGate</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-5757V-Prior to 19.1.0.0.230418</ProductID>
            <ProductID>P-5757V-Prior to 21.10.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="307" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="307" Title="Details" Type="Details">Vulnerability in the Management Cloud Engine product of Oracle Communications (component: BEServer (Apache Mina SSHD)).   The supported version that is affected is 22.1.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via SSH to compromise Management Cloud Engine.  Successful attacks of this vulnerability can result in takeover of Management Cloud Engine. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14252V-22.1.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Management Cloud Engine</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2942213.1</URL>
            <ProductID>P-14252V-22.1.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="308" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="308" Title="Details" Type="Details">Security-in-Depth issue in Oracle NoSQL Database (component: Administration (Apache Mina SSHD)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13373V-Prior to 19.5.32</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle NoSQL Database</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-13373V-Prior to 19.5.32</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="309" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="309" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Webserver (Apache Mina SSHD)).   The supported version that is affected is 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.60</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.60</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="310" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="310" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations (Apache Mina SSHD)).   The supported version that is affected is 19.0.0.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Retail Customer Management and Segmentation Foundation</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2934131.1</URL>
            <ProductID>P-13388V-19.0.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="311" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45047</Title>
      <Notes>
         <Note Audience="All" Ordinal="311" Title="Details" Type="Details">Security-in-Depth issue in Oracle SQL Developer (component: Installation (Apache Mina SSHD)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45047</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-1875V-Prior to 22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQL Developer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1875V-Prior to 22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="312" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45061</Title>
      <Notes>
         <Note Audience="All" Ordinal="312" Title="Details" Type="Details">Vulnerability in the Oracle Database OML4PY (Python) component of Oracle Database Server.   The supported version that is affected is 21c. Easily exploitable vulnerability allows low privileged attacker having Authenticated User privilege with network access via HTTP to compromise Oracle Database OML4PY (Python).  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Database OML4PY (Python). CVSS 3.1 Base Score 4.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45061</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5(Oracle Database OML4PY)V-21c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Database OML4PY (Python)</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-5(Oracle Database OML4PY)V-21c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="313" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="313" Title="Details" Type="Details">Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Security (Apache Tomcat)).   The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Agile PLM accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4461V-9.3.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Agile PLM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939856.1</URL>
            <ProductID>P-4461V-9.3.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="314" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="314" Title="Details" Type="Details">Security-in-Depth issue in Oracle Big Data Spatial and Graph (component: Big Data Graph (Apache Tomcat)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-11528V-Prior to 23.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Big Data Spatial and Graph</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-11528V-Prior to 23.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="315" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="315" Title="Details" Type="Details">Vulnerability in the Oracle Commerce Guided Search product of Oracle Commerce (component: Content Acquisition System, Workbench (Apache Tomcat)).   The supported version that is affected is 11.3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Commerce Guided Search accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9633V-11.3.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Commerce Guided Search</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939844.1</URL>
            <ProductID>P-9633V-11.3.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="316" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="316" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Binding Support Function product of Oracle Communications (component: Policy (Apache Tomcat)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Binding Support Function.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Cloud Native Core Binding Support Function accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Binding Support Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938417.1</URL>
            <ProductID>P-14121V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14121V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="317" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="317" Title="Details" Type="Details">Vulnerability in the Oracle Communications Diameter Signaling Router product of Oracle Communications (component: Platform (Apache Tomcat)).   The supported version that is affected is 8.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Diameter Signaling Router accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10899V-8.6.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Diameter Signaling Router</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938440.1</URL>
            <ProductID>P-10899V-8.6.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="318" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="318" Title="Details" Type="Details">Vulnerability in the Oracle Communications Element Manager product of Oracle Communications (component: BEServer (Apache Tomcat)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Element Manager.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Element Manager accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Element Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938441.1</URL>
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="319" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="319" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Report Manager product of Oracle Communications (component: BEServer (Apache Tomcat)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Session Report Manager.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Session Report Manager accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Report Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938447.1</URL>
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="320" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="320" Title="Details" Type="Details">Security-in-Depth issue in the Oracle Database (Apache Tomcat) component of Oracle Database Server. This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-5(Oracle Database)V-19c</ProductID>
            <ProductID>P-5(Oracle Database)V-21c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Database (Apache Tomcat)</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-5(Oracle Database)V-19c</ProductID>
            <ProductID>P-5(Oracle Database)V-21c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="321" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="321" Title="Details" Type="Details">Security-in-Depth issue in Oracle Graph Server and Client (component: Packaging (Apache Tomcat)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-14069V-Prior to 23.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Graph Server and Client</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-14069V-Prior to 23.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="322" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="322" Title="Details" Type="Details">Vulnerability in the MySQL Enterprise Monitor product of Oracle MySQL (component: Monitoring: General (Apache Tomcat)).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Enterprise Monitor.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all MySQL Enterprise Monitor accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8480V-8.0.33 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Enterprise Monitor</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8480V-8.0.33 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="323" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45143</Title>
      <Notes>
         <Note Audience="All" Ordinal="323" Title="Details" Type="Details">Vulnerability in the Oracle SD-WAN Edge product of Oracle Communications (component: Internal tools (Apache Tomcat)).   The supported version that is affected is 9.1.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SD-WAN Edge.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle SD-WAN Edge accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45143</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SD-WAN Edge</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938444.1</URL>
            <ProductID>P-13940V-9.1.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="324" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45685</Title>
      <Notes>
         <Note Audience="All" Ordinal="324" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security (Jettison)).  Supported versions that are affected are 8.58, 8.59 and  8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45685</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="325" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45685</Title>
      <Notes>
         <Note Audience="All" Ordinal="325" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Third Party (Jettison)).  Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45685</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="326" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-45693</Title>
      <Notes>
         <Note Audience="All" Ordinal="326" Title="Details" Type="Details">Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: Third Party (Jettison)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Identity Manager. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-45693</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1980V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Identity Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-1980V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="327" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46364</Title>
      <Notes>
         <Note Audience="All" Ordinal="327" Title="Details" Type="Details">Vulnerability in the Oracle Banking Digital Experience product of Oracle Financial Services Applications (component: UI General (Apache CXF)).  Supported versions that are affected are 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Digital Experience.  Successful attacks of this vulnerability can result in takeover of Oracle Banking Digital Experience. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46364</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Digital Experience</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="328" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46364</Title>
      <Notes>
         <Note Audience="All" Ordinal="328" Title="Details" Type="Details">Vulnerability in the Oracle Communications Diameter Signaling Router product of Oracle Communications (component: Virtual Network Function Manager (Apache CXF)).   The supported version that is affected is 8.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Diameter Signaling Router. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46364</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10899V-8.6.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Diameter Signaling Router</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938440.1</URL>
            <ProductID>P-10899V-8.6.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="329" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46364</Title>
      <Notes>
         <Note Audience="All" Ordinal="329" Title="Details" Type="Details">Vulnerability in the Oracle Communications Element Manager product of Oracle Communications (component: SOAP (Apache CXF)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Element Manager.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Element Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46364</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Element Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938441.1</URL>
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="330" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46364</Title>
      <Notes>
         <Note Audience="All" Ordinal="330" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Report Manager product of Oracle Communications (component: SOAP (Apache CXF)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Session Report Manager.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Session Report Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46364</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Report Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938447.1</URL>
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="331" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46364</Title>
      <Notes>
         <Note Audience="All" Ordinal="331" Title="Details" Type="Details">Security-in-Depth issue in Oracle Essbase (component: Essbase Web Platform (Apache CXF)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46364</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-4379V-21.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Essbase</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-4379V-21.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="332" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46908</Title>
      <Notes>
         <Note Audience="All" Ordinal="332" Title="Details" Type="Details">Vulnerability in the Oracle Communications Convergent Charging Controller product of Oracle Communications Applications (component: Common fns (SQLite)).  Supported versions that are affected are 6.0.1.0.0 and  12.0.1.0.0-12.0.6.0.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Convergent Charging Controller executes to compromise Oracle Communications Convergent Charging Controller.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Convergent Charging Controller accessible data as well as  unauthorized access to critical data or complete access to all Oracle Communications Convergent Charging Controller accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Convergent Charging Controller. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12985V-6.0.1.0.0</ProductID>
            <ProductID>P-12985V-12.0.1.0.0-12.0.6.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Convergent Charging Controller</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936023.1</URL>
            <ProductID>P-12985V-6.0.1.0.0</ProductID>
            <ProductID>P-12985V-12.0.1.0.0-12.0.6.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="333" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46908</Title>
      <Notes>
         <Note Audience="All" Ordinal="333" Title="Details" Type="Details">Vulnerability in the Oracle Communications Network Charging and Control product of Oracle Communications Applications (component: Common fns (SQLite)).  Supported versions that are affected are 6.0.1.0.0 and  12.0.1.0.0-12.0.6.0.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Network Charging and Control executes to compromise Oracle Communications Network Charging and Control.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Network Charging and Control accessible data as well as  unauthorized access to critical data or complete access to all Oracle Communications Network Charging and Control accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Network Charging and Control. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4623V-6.0.1.0.0</ProductID>
            <ProductID>P-4623V-12.0.1.0.0-12.0.6.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Network Charging and Control</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936023.1</URL>
            <ProductID>P-4623V-6.0.1.0.0</ProductID>
            <ProductID>P-4623V-12.0.1.0.0-12.0.6.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="334" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46908</Title>
      <Notes>
         <Note Audience="All" Ordinal="334" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Compliance Studio product of Oracle Financial Services Applications (component: Application (SQLite)).   The supported version that is affected is 8.1.2.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Financial Services Compliance Studio executes to compromise Oracle Financial Services Compliance Studio.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Compliance Studio accessible data as well as  unauthorized access to critical data or complete access to all Oracle Financial Services Compliance Studio accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Financial Services Compliance Studio. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14392V-8.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Compliance Studio</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936394.1</URL>
            <ProductID>P-14392V-8.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="335" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46908</Title>
      <Notes>
         <Note Audience="All" Ordinal="335" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Translational Research product of Oracle HealthCare Applications (component: DataStudio (SQLite)).  Supported versions that are affected are 4.1.0 and  4.1.1. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Healthcare Translational Research executes to compromise Oracle Healthcare Translational Research.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Healthcare Translational Research accessible data as well as  unauthorized access to critical data or complete access to all Oracle Healthcare Translational Research accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Healthcare Translational Research. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Translational Research</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="336" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-46908</Title>
      <Notes>
         <Note Audience="All" Ordinal="336" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Third Party (SQLite)).   The supported version that is affected is 8.5.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Outside In Technology executes to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Outside In Technology accessible data as well as  unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-46908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Outside In Technology</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-2276V-8.5.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="337" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-47629</Title>
      <Notes>
         <Note Audience="All" Ordinal="337" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Configuration Console product of Oracle Communications (component: Configuration (libksba)).   The supported version that is affected is 22.4.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Configuration Console.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Configuration Console. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-47629</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14250V-22.4.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Configuration Console</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938418.1</URL>
            <ProductID>P-14250V-22.4.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="338" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-47629</Title>
      <Notes>
         <Note Audience="All" Ordinal="338" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Network Exposure Function product of Oracle Communications (component: Oracle Linux (libksba)).   The supported version that is affected is 22.4.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Network Exposure Function.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Network Exposure Function. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-47629</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14122V-22.4.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Network Exposure Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938420.1</URL>
            <ProductID>P-14122V-22.4.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="339" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-47629</Title>
      <Notes>
         <Note Audience="All" Ordinal="339" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Policy product of Oracle Communications (component: Policy (libksba)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Policy.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Policy. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-47629</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Policy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938436.1</URL>
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="340" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-47629</Title>
      <Notes>
         <Note Audience="All" Ordinal="340" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Security Edge Protection Proxy product of Oracle Communications (component: Configuration (libksba)).   The supported version that is affected is 22.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via SSH to compromise Oracle Communications Cloud Native Core Security Edge Protection Proxy.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Security Edge Protection Proxy. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-47629</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14123V-22.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Security Edge Protection Proxy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938437.1</URL>
            <ProductID>P-14123V-22.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="341" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2022-47629</Title>
      <Notes>
         <Note Audience="All" Ordinal="341" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Unified Data Repository product of Oracle Communications (component: Signaling (libksba)).  Supported versions that are affected are 22.4.1 and  23.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Unified Data Repository.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Unified Data Repository. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2022-47629</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14119V-22.4.1</ProductID>
            <ProductID>P-14119V-23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Unified Data Repository</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938438.1</URL>
            <ProductID>P-14119V-22.4.1</ProductID>
            <ProductID>P-14119V-23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="342" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-0215</Title>
      <Notes>
         <Note Audience="All" Ordinal="342" Title="Details" Type="Details">Vulnerability in Oracle Essbase (component: Build (OpenSSL)).   The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Essbase.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Essbase. CVSS 3.1 Base Score 5.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-0215</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4379V-21.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Essbase</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-4379V-21.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="343" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-0215</Title>
      <Notes>
         <Note Audience="All" Ordinal="343" Title="Details" Type="Details">Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/C++ (OpenSSL)).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-0215</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8576(Connector/C++)V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Connectors</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8576(Connector/C++)V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="344" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-0215</Title>
      <Notes>
         <Note Audience="All" Ordinal="344" Title="Details" Type="Details">Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/ODBC (OpenSSL)).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-0215</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8576(Connector/ODBC)V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Connectors</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8576(Connector/ODBC)V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="345" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-0215</Title>
      <Notes>
         <Note Audience="All" Ordinal="345" Title="Details" Type="Details">Vulnerability in the MySQL Enterprise Monitor product of Oracle MySQL (component: Monitoring: General (OpenSSL)).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Enterprise Monitor.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Enterprise Monitor. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-0215</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8480V-8.0.33 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Enterprise Monitor</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8480V-8.0.33 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="346" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-0215</Title>
      <Notes>
         <Note Audience="All" Ordinal="346" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging (OpenSSL)).  Supported versions that are affected are 5.7.41 and prior and  8.0.32 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-0215</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="347" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-0215</Title>
      <Notes>
         <Note Audience="All" Ordinal="347" Title="Details" Type="Details">Vulnerability in the MySQL Workbench product of Oracle MySQL (component: Workbench (OpenSSL)).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via MySQL Workbench to compromise MySQL Workbench.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Workbench. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-0215</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4627V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Workbench</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-4627V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="348" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-0361</Title>
      <Notes>
         <Note Audience="All" Ordinal="348" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Network Repository Function product of Oracle Communications (component: Installer (GnuTLS)).   The supported version that is affected is 23.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Network Repository Function.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications Cloud Native Core Network Repository Function accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-0361</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14118V-23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Network Repository Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938435.1</URL>
            <ProductID>P-14118V-23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="349" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-0662</Title>
      <Notes>
         <Note Audience="All" Ordinal="349" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Core (PHP)).  Supported versions that are affected are 6.0.0-6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Unified Assurance. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-0662</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="350" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-1370</Title>
      <Notes>
         <Note Audience="All" Ordinal="350" Title="Details" Type="Details">Vulnerability in the Oracle Communications Unified Assurance product of Oracle Communications Applications (component: Vision (json-smart)).  Supported versions that are affected are 5.5.0-5.5.10 and  6.0.0-6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Unified Assurance.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Unified Assurance. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-1370</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Unified Assurance</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936013.1</URL>
            <ProductID>P-14597V-5.5.0-5.5.10</ProductID>
            <ProductID>P-14597V-6.0.0-6.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="351" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21896</Title>
      <Notes>
         <Note Audience="All" Ordinal="351" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: NSSwitch).  Supported versions that are affected are 10 and  11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21896</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Solaris</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940069.1</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="352" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21902</Title>
      <Notes>
         <Note Audience="All" Ordinal="352" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Behavior Detection Platform product of Oracle Financial Services Applications (component: Application).   The supported version that is affected is 8.0.8.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Behavior Detection Platform.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Financial Services Behavior Detection Platform accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21902</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9190V-8.0.8.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Behavior Detection Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936356.1</URL>
            <ProductID>P-9190V-8.0.8.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="353" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21903</Title>
      <Notes>
         <Note Audience="All" Ordinal="353" Title="Details" Type="Details">Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: OBVAM Internal Tfr Domain).  Supported versions that are affected are 14.5, 14.6 and  14.7. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data as well as  unauthorized update, insert or delete access to some of Oracle Banking Virtual Account Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Virtual Account Management. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21903</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Virtual Account Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="354" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21904</Title>
      <Notes>
         <Note Audience="All" Ordinal="354" Title="Details" Type="Details">Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: OBVAM Trn Journal Domain).  Supported versions that are affected are 14.5, 14.6 and  14.7. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data as well as  unauthorized update, insert or delete access to some of Oracle Banking Virtual Account Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Virtual Account Management. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21904</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Virtual Account Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="355" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21905</Title>
      <Notes>
         <Note Audience="All" Ordinal="355" Title="Details" Type="Details">Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: Routing Hub).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Banking Virtual Account Management accessible data as well as  unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21905</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Virtual Account Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="356" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21906</Title>
      <Notes>
         <Note Audience="All" Ordinal="356" Title="Details" Type="Details">Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: SMS Module).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Banking Virtual Account Management accessible data as well as  unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21906</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Virtual Account Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="357" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21907</Title>
      <Notes>
         <Note Audience="All" Ordinal="357" Title="Details" Type="Details">Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: OBVAM Trn Journal Domain).  Supported versions that are affected are 14.5, 14.6 and  14.7. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data as well as  unauthorized update, insert or delete access to some of Oracle Banking Virtual Account Management accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Virtual Account Management. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21907</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.0</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Virtual Account Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="358" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21908</Title>
      <Notes>
         <Note Audience="All" Ordinal="358" Title="Details" Type="Details">Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: OBVAM Trn Journal Domain).  Supported versions that are affected are 14.5, 14.6 and  14.7. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data as well as  unauthorized update, insert or delete access to some of Oracle Banking Virtual Account Management accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Virtual Account Management. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21908</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.0</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Virtual Account Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13487V-14.5</ProductID>
            <ProductID>P-13487V-14.6</ProductID>
            <ProductID>P-13487V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="359" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21909</Title>
      <Notes>
         <Note Audience="All" Ordinal="359" Title="Details" Type="Details">Vulnerability in the Siebel CRM product of Oracle Siebel CRM (component: UI Framework).  Supported versions that are affected are 23.3 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel CRM.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Siebel CRM accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21909</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9011V-23.3 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Siebel CRM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939854.1</URL>
            <ProductID>P-9011V-23.3 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="360" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21910</Title>
      <Notes>
         <Note Audience="All" Ordinal="360" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Web General).  Supported versions that are affected are 6.4.0.0.0 and  12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21910</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="361" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21911</Title>
      <Notes>
         <Note Audience="All" Ordinal="361" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21911</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="362" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21912</Title>
      <Notes>
         <Note Audience="All" Ordinal="362" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 5.7.41 and prior and  8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21912</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.30 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.30 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="363" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21913</Title>
      <Notes>
         <Note Audience="All" Ordinal="363" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21913</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.31 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.31 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="364" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21915</Title>
      <Notes>
         <Note Audience="All" Ordinal="364" Title="Details" Type="Details">Vulnerability in the Oracle Banking Payments product of Oracle Financial Services Applications (component: Book/Internal Transfer).  Supported versions that are affected are 14.5, 14.6 and  14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data as well as  unauthorized read access to a subset of Oracle Banking Payments accessible data. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21915</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13011V-14.5</ProductID>
            <ProductID>P-13011V-14.6</ProductID>
            <ProductID>P-13011V-14.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.6</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Payments</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13011V-14.5</ProductID>
            <ProductID>P-13011V-14.6</ProductID>
            <ProductID>P-13011V-14.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="365" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21916</Title>
      <Notes>
         <Note Audience="All" Ordinal="365" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Web Server).  Supported versions that are affected are 8.58, 8.59 and  8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21916</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="366" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21917</Title>
      <Notes>
         <Note Audience="All" Ordinal="366" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21917</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.30 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.30 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="367" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21918</Title>
      <Notes>
         <Note Audience="All" Ordinal="367" Title="Details" Type="Details">Vulnerability in the Oracle Database Recovery Manager component of Oracle Database Server.  Supported versions that are affected are 19c and  21c. Easily exploitable vulnerability allows high privileged attacker having Local SYSDBA privilege with network access via Oracle Net to compromise Oracle Database Recovery Manager.  While the vulnerability is in Oracle Database Recovery Manager, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Database Recovery Manager. CVSS 3.1 Base Score 6.8 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21918</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5(Oracle Database Recovery Manager)V-19c</ProductID>
            <ProductID>P-5(Oracle Database Recovery Manager)V-21c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Database Recovery Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-5(Oracle Database Recovery Manager)V-19c</ProductID>
            <ProductID>P-5(Oracle Database Recovery Manager)V-21c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="368" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21919</Title>
      <Notes>
         <Note Audience="All" Ordinal="368" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21919</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="369" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21920</Title>
      <Notes>
         <Note Audience="All" Ordinal="369" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21920</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="370" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21921</Title>
      <Notes>
         <Note Audience="All" Ordinal="370" Title="Details" Type="Details">Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core).  Supported versions that are affected are Prior to 6.3.1.3 and  Prior to 7.0.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Health Sciences InForm.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Health Sciences InForm accessible data as well as  unauthorized read access to a subset of Oracle Health Sciences InForm accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21921</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Health Sciences InForm</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="371" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21922</Title>
      <Notes>
         <Note Audience="All" Ordinal="371" Title="Details" Type="Details">Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core).  Supported versions that are affected are Prior to 6.3.1.3 and  Prior to 7.0.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Health Sciences InForm.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Health Sciences InForm accessible data as well as  unauthorized access to critical data or complete access to all Oracle Health Sciences InForm accessible data. CVSS 3.1 Base Score 6.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21922</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Health Sciences InForm</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="372" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21923</Title>
      <Notes>
         <Note Audience="All" Ordinal="372" Title="Details" Type="Details">Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core).  Supported versions that are affected are Prior to 6.3.1.3 and  Prior to 7.0.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Health Sciences InForm.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Health Sciences InForm accessible data as well as  unauthorized access to critical data or complete access to all Oracle Health Sciences InForm accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Health Sciences InForm. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21923</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Health Sciences InForm</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="373" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21924</Title>
      <Notes>
         <Note Audience="All" Ordinal="373" Title="Details" Type="Details">Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core).  Supported versions that are affected are Prior to 6.3.1.3 and  Prior to 7.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Health Sciences InForm.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Health Sciences InForm, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Health Sciences InForm accessible data as well as  unauthorized read access to a subset of Oracle Health Sciences InForm accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Health Sciences InForm. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21924</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Health Sciences InForm</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="374" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21925</Title>
      <Notes>
         <Note Audience="All" Ordinal="374" Title="Details" Type="Details">Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core).  Supported versions that are affected are Prior to 6.3.1.3 and  Prior to 7.0.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Health Sciences InForm.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Health Sciences InForm. CVSS 3.1 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21925</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Health Sciences InForm</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="375" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21926</Title>
      <Notes>
         <Note Audience="All" Ordinal="375" Title="Details" Type="Details">Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core).  Supported versions that are affected are Prior to 6.3.1.3 and  Prior to 7.0.0.1. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Health Sciences InForm executes to compromise Oracle Health Sciences InForm.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Health Sciences InForm accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21926</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Health Sciences InForm</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-9636V-Prior to 6.3.1.3</ProductID>
            <ProductID>P-9636V-Prior to 7.0.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="376" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21927</Title>
      <Notes>
         <Note Audience="All" Ordinal="376" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Interoperability SEC).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21927</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="377" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21928</Title>
      <Notes>
         <Note Audience="All" Ordinal="377" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: IPS repository daemon).   The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Solaris accessible data. CVSS 3.1 Base Score 1.8 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21928</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>1.8</BaseScore>
            <Vector>AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Solaris</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940069.1</URL>
            <ProductID>P-10006V-11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="378" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21929</Title>
      <Notes>
         <Note Audience="All" Ordinal="378" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21929</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="379" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21930</Title>
      <Notes>
         <Note Audience="All" Ordinal="379" Title="Details" Type="Details">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE).  Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and  22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21930</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.4</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Java SE, Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="380" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21931</Title>
      <Notes>
         <Note Audience="All" Ordinal="380" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core).  Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21931</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="381" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21932</Title>
      <Notes>
         <Note Audience="All" Ordinal="381" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: OXI).   The supported version that is affected is 5.6. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services.  While the vulnerability is in Oracle Hospitality OPERA 5 Property Services, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data as well as  unauthorized update, insert or delete access to some of Oracle Hospitality OPERA 5 Property Services accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21932</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11580V-5.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.2</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Hospitality OPERA 5 Property Services</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935379.1</URL>
            <ProductID>P-11580V-5.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="382" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21933</Title>
      <Notes>
         <Note Audience="All" Ordinal="382" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21933</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="383" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21934</Title>
      <Notes>
         <Note Audience="All" Ordinal="383" Title="Details" Type="Details">Vulnerability in the Java VM component of Oracle Database Server.  Supported versions that are affected are 19c and  21c. Difficult to exploit vulnerability allows low privileged attacker having User Account privilege with network access via TLS to compromise Java VM.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Java VM accessible data as well as  unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 6.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21934</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5(Java VM)V-19c</ProductID>
            <ProductID>P-5(Java VM)V-21c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Java VM</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-5(Java VM)V-19c</ProductID>
            <ProductID>P-5(Java VM)V-21c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="384" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21935</Title>
      <Notes>
         <Note Audience="All" Ordinal="384" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21935</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="385" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21936</Title>
      <Notes>
         <Note Audience="All" Ordinal="385" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC).  Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as  unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21936</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>JD Edwards EnterpriseOne Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939855.1</URL>
            <ProductID>P-4781V-Prior to 9.2.7.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="386" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21937</Title>
      <Notes>
         <Note Audience="All" Ordinal="386" Title="Details" Type="Details">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking).  Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and  22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21937</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Java SE, Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="387" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21938</Title>
      <Notes>
         <Note Audience="All" Ordinal="387" Title="Details" Type="Details">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries).  Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and  22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21938</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.8</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.4</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Java SE, Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.8</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.4</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="388" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21939</Title>
      <Notes>
         <Note Audience="All" Ordinal="388" Title="Details" Type="Details">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing).  Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and  22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21939</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Java SE, Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="389" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21940</Title>
      <Notes>
         <Note Audience="All" Ordinal="389" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21940</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.4</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="390" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21941</Title>
      <Notes>
         <Note Audience="All" Ordinal="390" Title="Details" Type="Details">Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server).  Supported versions that are affected are 6.4.0.0.0 and  12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21941</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-6.4.0.0.0</ProductID>
            <ProductID>P-1479V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle BI Publisher</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-1479V-6.4.0.0.0</ProductID>
            <ProductID>P-1479V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="391" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21942</Title>
      <Notes>
         <Note Audience="All" Ordinal="391" Title="Details" Type="Details">Vulnerability in Oracle Essbase (component: Security and Provisioning).   The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21942</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4379V-21.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Essbase</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-4379V-21.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="392" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21943</Title>
      <Notes>
         <Note Audience="All" Ordinal="392" Title="Details" Type="Details">Vulnerability in Oracle Essbase (component: Security and Provisioning).   The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21943</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4379V-21.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Essbase</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-4379V-21.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="393" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21944</Title>
      <Notes>
         <Note Audience="All" Ordinal="393" Title="Details" Type="Details">Vulnerability in Oracle Essbase (component: Security and Provisioning).   The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21944</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4379V-21.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Essbase</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-4379V-21.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="394" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21945</Title>
      <Notes>
         <Note Audience="All" Ordinal="394" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21945</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="395" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21946</Title>
      <Notes>
         <Note Audience="All" Ordinal="395" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21946</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="396" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21947</Title>
      <Notes>
         <Note Audience="All" Ordinal="396" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21947</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.4</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="397" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21948</Title>
      <Notes>
         <Note Audience="All" Ordinal="397" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Core).   The supported version that is affected is 10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21948</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Solaris</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940069.1</URL>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="398" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21952</Title>
      <Notes>
         <Note Audience="All" Ordinal="398" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21952</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="399" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21953</Title>
      <Notes>
         <Note Audience="All" Ordinal="399" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21953</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="400" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21954</Title>
      <Notes>
         <Note Audience="All" Ordinal="400" Title="Details" Type="Details">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and  22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21954</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Java SE, Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="401" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21955</Title>
      <Notes>
         <Note Audience="All" Ordinal="401" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21955</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="402" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21956</Title>
      <Notes>
         <Note Audience="All" Ordinal="402" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container).  Supported versions that are affected are 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as  unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21956</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="403" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21959</Title>
      <Notes>
         <Note Audience="All" Ordinal="403" Title="Details" Type="Details">Vulnerability in the Oracle iReceivables product of Oracle E-Business Suite (component: Attachments).  Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iReceivables.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle iReceivables accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21959</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1106V-12.2.3-12.2.12</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle iReceivables</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2484000.1</URL>
            <ProductID>P-1106V-12.2.3-12.2.12</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="404" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21960</Title>
      <Notes>
         <Note Audience="All" Ordinal="404" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core).  Supported versions that are affected are 12.2.1.3.0 and  12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as  unauthorized read access to a subset of Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21960</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.6</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="405" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21962</Title>
      <Notes>
         <Note Audience="All" Ordinal="405" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21962</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="406" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21963</Title>
      <Notes>
         <Note Audience="All" Ordinal="406" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling).  Supported versions that are affected are 5.7.40 and prior and  8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21963</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.40 and prior</ProductID>
            <ProductID>P-8478V-8.0.31 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.7</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-5.7.40 and prior</ProductID>
            <ProductID>P-8478V-8.0.31 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="407" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21964</Title>
      <Notes>
         <Note Audience="All" Ordinal="407" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core).  Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21964</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="408" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21965</Title>
      <Notes>
         <Note Audience="All" Ordinal="408" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21965</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Business Intelligence Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-2025V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="409" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21966</Title>
      <Notes>
         <Note Audience="All" Ordinal="409" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21966</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="410" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21967</Title>
      <Notes>
         <Note Audience="All" Ordinal="410" Title="Details" Type="Details">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE).  Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and  22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21967</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Java SE, Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="411" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21968</Title>
      <Notes>
         <Note Audience="All" Ordinal="411" Title="Details" Type="Details">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries).  Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and  22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21968</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Java SE, Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-856V-Oracle Java SE:8u361</ProductID>
            <ProductID>P-856V-Oracle Java SE:8u361-perf</ProductID>
            <ProductID>P-856V-Oracle Java SE:11.0.18</ProductID>
            <ProductID>P-856V-Oracle Java SE:17.0.6</ProductID>
            <ProductID>P-856V-Oracle Java SE:20</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="412" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21969</Title>
      <Notes>
         <Note Audience="All" Ordinal="412" Title="Details" Type="Details">Vulnerability in Oracle SQL Developer (component: Installation).  Supported versions that are affected are Prior to 23.1.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle SQL Developer executes to compromise Oracle SQL Developer.  Successful attacks of this vulnerability can result in takeover of Oracle SQL Developer. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21969</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.7</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQL Developer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="413" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21970</Title>
      <Notes>
         <Note Audience="All" Ordinal="413" Title="Details" Type="Details">Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Security).   The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21970</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-6.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle BI Publisher</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936091.2</URL>
            <ProductID>P-1479V-6.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="414" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21971</Title>
      <Notes>
         <Note Audience="All" Ordinal="414" Title="Details" Type="Details">Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J).  Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors as well as  unauthorized update, insert or delete access to some of MySQL Connectors accessible data and  unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21971</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8576V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Connectors</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8576V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="415" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21972</Title>
      <Notes>
         <Note Audience="All" Ordinal="415" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21972</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="416" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21973</Title>
      <Notes>
         <Note Audience="All" Ordinal="416" Title="Details" Type="Details">Vulnerability in the Oracle iProcurement product of Oracle E-Business Suite (component: E-Content Manager Catalog).  Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iProcurement.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iProcurement, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle iProcurement accessible data as well as  unauthorized read access to a subset of Oracle iProcurement accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21973</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-398V-12.2.3-12.2.12</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle iProcurement</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2484000.1</URL>
            <ProductID>P-398V-12.2.3-12.2.12</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="417" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21976</Title>
      <Notes>
         <Note Audience="All" Ordinal="417" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21976</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="418" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21977</Title>
      <Notes>
         <Note Audience="All" Ordinal="418" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21977</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="419" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21978</Title>
      <Notes>
         <Note Audience="All" Ordinal="419" Title="Details" Type="Details">Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: GUI).  Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Object Library.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as  unauthorized read access to a subset of Oracle Application Object Library accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Application Object Library. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21978</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-510V-12.2.3-12.2.11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Application Object Library</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2484000.1</URL>
            <ProductID>P-510V-12.2.3-12.2.11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="420" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21979</Title>
      <Notes>
         <Note Audience="All" Ordinal="420" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core).  Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21979</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="421" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21980</Title>
      <Notes>
         <Note Audience="All" Ordinal="421" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs).  Supported versions that are affected are 5.7.41 and prior and  8.0.32 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21980</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.1</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-5.7.41 and prior</ProductID>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="422" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21981</Title>
      <Notes>
         <Note Audience="All" Ordinal="422" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Elastic Search).  Supported versions that are affected are 8.58, 8.59 and  8.60. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21981</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise PeopleTools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5085V-8.58</ProductID>
            <ProductID>P-5085V-8.59</ProductID>
            <ProductID>P-5085V-8.60</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="423" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21982</Title>
      <Notes>
         <Note Audience="All" Ordinal="423" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21982</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>MySQL Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2937307.1</URL>
            <ProductID>P-8478V-8.0.32 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="424" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21984</Title>
      <Notes>
         <Note Audience="All" Ordinal="424" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Libraries).   The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Solaris.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21984</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Solaris</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940069.1</URL>
            <ProductID>P-10006V-11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="425" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21985</Title>
      <Notes>
         <Note Audience="All" Ordinal="425" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility).  Supported versions that are affected are 10 and  11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.7 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21985</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.7</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Solaris</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940069.1</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="426" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21986</Title>
      <Notes>
         <Note Audience="All" Ordinal="426" Title="Details" Type="Details">Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Native Image).  Supported versions that are affected are Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and  22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle GraalVM Enterprise Edition executes to compromise Oracle GraalVM Enterprise Edition.  While the vulnerability is in Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.1 Base Score 5.7 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21986</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.7</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="427" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21987</Title>
      <Notes>
         <Note Audience="All" Ordinal="427" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21987</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="428" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21988</Title>
      <Notes>
         <Note Audience="All" Ordinal="428" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21988</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="429" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21989</Title>
      <Notes>
         <Note Audience="All" Ordinal="429" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21989</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.0</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="430" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21990</Title>
      <Notes>
         <Note Audience="All" Ordinal="430" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21990</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.2</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="431" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21991</Title>
      <Notes>
         <Note Audience="All" Ordinal="431" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.2 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21991</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.2</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="432" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21992</Title>
      <Notes>
         <Note Audience="All" Ordinal="432" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: Administer Workforce).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21992</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5071V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>PeopleSoft Enterprise HCM Human Resources</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939793.1</URL>
            <ProductID>P-5071V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="433" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21993</Title>
      <Notes>
         <Note Audience="All" Ordinal="433" Title="Details" Type="Details">Vulnerability in the Oracle Clinical Remote Data Capture product of Oracle Health Sciences Applications (component: Forms).   The supported version that is affected is 5.4.0.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Clinical Remote Data Capture.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Clinical Remote Data Capture accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21993</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1041V-5.4.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Clinical Remote Data Capture</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938697.1</URL>
            <ProductID>P-1041V-5.4.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="434" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21996</Title>
      <Notes>
         <Note Audience="All" Ordinal="434" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services).  Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21996</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
            <ProductID>P-5242V-12.2.1.4.0</ProductID>
            <ProductID>P-5242V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="435" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21997</Title>
      <Notes>
         <Note Audience="All" Ordinal="435" Title="Details" Type="Details">Vulnerability in the Oracle User Management product of Oracle E-Business Suite (component: Proxy User Delegation).  Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle User Management.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle User Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21997</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1475V-12.2.3-12.2.12</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle User Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2484000.1</URL>
            <ProductID>P-1475V-12.2.3-12.2.12</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="436" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21998</Title>
      <Notes>
         <Note Audience="All" Ordinal="436" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as  unauthorized read access to a subset of Oracle VM VirtualBox accessible data.  Note: This vulnerability applies to Windows VMs only. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.6</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="437" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-21999</Title>
      <Notes>
         <Note Audience="All" Ordinal="437" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as  unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-21999</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.6</BaseScore>
            <Vector>AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="438" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-22000</Title>
      <Notes>
         <Note Audience="All" Ordinal="438" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as  unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-22000</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.6</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="439" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-22001</Title>
      <Notes>
         <Note Audience="All" Ordinal="439" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as  unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-22001</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.6</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="440" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-22002</Title>
      <Notes>
         <Note Audience="All" Ordinal="440" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 6.1.44 and  Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-22002</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.0</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle VM VirtualBox</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940494.1</URL>
            <ProductID>P-8370V-Prior to 6.1.44</ProductID>
            <ProductID>P-8370V-Prior to 7.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="441" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-22003</Title>
      <Notes>
         <Note Audience="All" Ordinal="441" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility).  Supported versions that are affected are 10 and  11. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.3 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-22003</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.3</BaseScore>
            <Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Solaris</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2940069.1</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="442" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-22899</Title>
      <Notes>
         <Note Audience="All" Ordinal="442" Title="Details" Type="Details">Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Third Party (Zip4j)).   The supported version that is affected is 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Access Manager accessible data. CVSS 3.1 Base Score 5.9 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-22899</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5565V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Access Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5565V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="443" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23914</Title>
      <Notes>
         <Note Audience="All" Ordinal="443" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Translational Research product of Oracle HealthCare Applications (component: DataStudio (cURL)).  Supported versions that are affected are 4.1.0 and  4.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Healthcare Translational Research.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Healthcare Translational Research accessible data as well as  unauthorized access to critical data or complete access to all Oracle Healthcare Translational Research accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23914</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Translational Research</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="444" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23916</Title>
      <Notes>
         <Note Audience="All" Ordinal="444" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Configuration Console product of Oracle Communications (component: Configuration (cURL)).  Supported versions that are affected are 22.4.1 and  23.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Configuration Console.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Configuration Console. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23916</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14250V-22.4.1</ProductID>
            <ProductID>P-14250V-23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Configuration Console</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938418.1</URL>
            <ProductID>P-14250V-22.4.1</ProductID>
            <ProductID>P-14250V-23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="445" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23916</Title>
      <Notes>
         <Note Audience="All" Ordinal="445" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Network Exposure Function product of Oracle Communications (component: Oracle Linux (cURL)).  Supported versions that are affected are 22.4.2 and  23.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Network Exposure Function.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Network Exposure Function. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23916</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14122V-22.4.2</ProductID>
            <ProductID>P-14122V-23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Network Exposure Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938420.1</URL>
            <ProductID>P-14122V-22.4.2</ProductID>
            <ProductID>P-14122V-23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="446" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23916</Title>
      <Notes>
         <Note Audience="All" Ordinal="446" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Security Edge Protection Proxy product of Oracle Communications (component: Configuration (cURL)).  Supported versions that are affected are 23.1.0 and  22.4.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via SSH to compromise Oracle Communications Cloud Native Core Security Edge Protection Proxy.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Security Edge Protection Proxy. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23916</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14123V-23.1.0</ProductID>
            <ProductID>P-14123V-22.4.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Security Edge Protection Proxy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938437.1</URL>
            <ProductID>P-14123V-23.1.0</ProductID>
            <ProductID>P-14123V-22.4.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="447" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23916</Title>
      <Notes>
         <Note Audience="All" Ordinal="447" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Unified Data Repository product of Oracle Communications (component: Signaling (cURL)).   The supported version that is affected is 22.4.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Unified Data Repository.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Unified Data Repository. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23916</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14119V-22.4.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Unified Data Repository</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938438.1</URL>
            <ProductID>P-14119V-22.4.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="448" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23916</Title>
      <Notes>
         <Note Audience="All" Ordinal="448" Title="Details" Type="Details">Security-in-Depth issue in Oracle Essbase (component: Essbase Web Platform (cURL)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23916</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-4379V-21.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Essbase</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-4379V-21.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="449" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23918</Title>
      <Notes>
         <Note Audience="All" Ordinal="449" Title="Details" Type="Details">Security-in-Depth issue in the Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Node (Node.js)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23918</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle GraalVM Enterprise Edition</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2935948.1</URL>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:20.3.9</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:21.3.5</ProductID>
            <ProductID>P-13497V-Oracle GraalVM Enterprise Edition:22.3.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="450" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23931</Title>
      <Notes>
         <Note Audience="All" Ordinal="450" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Network Exposure Function product of Oracle Communications (component: Platform (Cryptography)).   The supported version that is affected is 22.4.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Network Exposure Function.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Cloud Native Core Network Exposure Function accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Cloud Native Core Network Exposure Function. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23931</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14122V-22.4.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Network Exposure Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938420.1</URL>
            <ProductID>P-14122V-22.4.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="451" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-23931</Title>
      <Notes>
         <Note Audience="All" Ordinal="451" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Security Edge Protection Proxy product of Oracle Communications (component: Installation and Configuration (Cryptography)).  Supported versions that are affected are 22.4.0 and  23.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Communications Cloud Native Core Security Edge Protection Proxy.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Cloud Native Core Security Edge Protection Proxy accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Cloud Native Core Security Edge Protection Proxy. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-23931</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14123V-22.4.0</ProductID>
            <ProductID>P-14123V-23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Security Edge Protection Proxy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938437.1</URL>
            <ProductID>P-14123V-22.4.0</ProductID>
            <ProductID>P-14123V-23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="452" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="452" Title="Details" Type="Details">Vulnerability in the Oracle Banking APIs product of Oracle Financial Services Applications (component: IDM - Authentication (Apache Commons FileUpload)).  Supported versions that are affected are 18.2, 18.3, 19.1, 19.2, 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking APIs.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking APIs. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13676V-18.2</ProductID>
            <ProductID>P-13676V-18.3</ProductID>
            <ProductID>P-13676V-19.1</ProductID>
            <ProductID>P-13676V-19.2</ProductID>
            <ProductID>P-13676V-21.1</ProductID>
            <ProductID>P-13676V-22.1</ProductID>
            <ProductID>P-13676V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking APIs</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13676V-18.2</ProductID>
            <ProductID>P-13676V-18.3</ProductID>
            <ProductID>P-13676V-19.1</ProductID>
            <ProductID>P-13676V-19.2</ProductID>
            <ProductID>P-13676V-21.1</ProductID>
            <ProductID>P-13676V-22.1</ProductID>
            <ProductID>P-13676V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="453" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="453" Title="Details" Type="Details">Vulnerability in the Oracle Banking Digital Experience product of Oracle Financial Services Applications (component: UI General (Apache Commons FileUpload)).  Supported versions that are affected are 18.2, 18.3, 19.1, 19.2, 21.1, 22.1 and  22.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Digital Experience.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Digital Experience. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Digital Experience</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12605V-18.2</ProductID>
            <ProductID>P-12605V-18.3</ProductID>
            <ProductID>P-12605V-19.1</ProductID>
            <ProductID>P-12605V-19.2</ProductID>
            <ProductID>P-12605V-21.1</ProductID>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="454" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="454" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Network Exposure Function product of Oracle Communications (component: Platform (Apache Commons FileUpload)).  Supported versions that are affected are 22.4.2 and  23.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Network Exposure Function.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Network Exposure Function. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14122V-22.4.2</ProductID>
            <ProductID>P-14122V-23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Network Exposure Function</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938420.1</URL>
            <ProductID>P-14122V-22.4.2</ProductID>
            <ProductID>P-14122V-23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="455" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="455" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Security Edge Protection Proxy product of Oracle Communications (component: Configuration (Apache Commons FileUpload)).  Supported versions that are affected are 23.1.0 and  22.4.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Communications Cloud Native Core Security Edge Protection Proxy.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Security Edge Protection Proxy. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14123V-23.1.0</ProductID>
            <ProductID>P-14123V-22.4.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Security Edge Protection Proxy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938437.1</URL>
            <ProductID>P-14123V-23.1.0</ProductID>
            <ProductID>P-14123V-22.4.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="456" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="456" Title="Details" Type="Details">Vulnerability in the Oracle Communications Element Manager product of Oracle Communications (component: BEServer (Apache Commons FileUpload)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Element Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Element Manager. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Element Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938441.1</URL>
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="457" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="457" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Report Manager product of Oracle Communications (component: BEServer (Apache Commons FileUpload)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Session Report Manager.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Session Report Manager. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Report Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938447.1</URL>
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="458" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="458" Title="Details" Type="Details">Vulnerability in the Oracle Database Workload Manager (Apache Commons FileUpload) component of Oracle Database Server.   The supported version that is affected is 21c. Easily exploitable vulnerability allows low privileged attacker having Authenticated User privilege with network access via HTTP to compromise Oracle Database Workload Manager (Apache Commons FileUpload).  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Database Workload Manager (Apache Commons FileUpload). CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5(Oracle Database Workload Manager)V-21c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Database Workload Manager (Apache Commons FileUpload)</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-5(Oracle Database Workload Manager)V-21c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="459" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="459" Title="Details" Type="Details">Vulnerability in the Oracle Documaker product of Oracle Insurance Applications (component: Development Tools (Apache Commons FileUpload)).  Supported versions that are affected are 12.6.0.0.0, 12.6.2.0.0-12.6.4.0.0, 12.7.0.0.0 and  12.7.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Documaker.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Documaker. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5477V-12.6.0.0.0</ProductID>
            <ProductID>P-5477V-12.6.2.0.0-12.6.4.0.0</ProductID>
            <ProductID>P-5477V-12.7.0.0.0</ProductID>
            <ProductID>P-5477V-12.7.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Documaker</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939209.1</URL>
            <ProductID>P-5477V-12.6.0.0.0</ProductID>
            <ProductID>P-5477V-12.6.2.0.0-12.6.4.0.0</ProductID>
            <ProductID>P-5477V-12.7.0.0.0</ProductID>
            <ProductID>P-5477V-12.7.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="460" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="460" Title="Details" Type="Details">Vulnerability in the Oracle Middleware Common Libraries and Tools product of Oracle Fusion Middleware (component: Third Party (Apache Commons FileUpload)).   The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Middleware Common Libraries and Tools.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Middleware Common Libraries and Tools. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Middleware Common Libraries and Tools</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-4647V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="461" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="461" Title="Details" Type="Details">Vulnerability in Oracle REST Data Services (component: Oracle REST Data Services (Apache Commons FileUpload)).  Supported versions that are affected are Prior to 23.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle REST Data Services.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle REST Data Services. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9456V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle REST Data Services</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-9456V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="462" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="462" Title="Details" Type="Details">Vulnerability in the Spatial and Graph (Apache Commons Fileupload) component of Oracle Database Server.  Supported versions that are affected are 19c and  21c. Easily exploitable vulnerability allows low privileged attacker having Authenticated User privilege with network access via HTTP to compromise Spatial and Graph (Apache Commons Fileupload).  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Spatial and Graph (Apache Commons Fileupload). CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-619V-19c</ProductID>
            <ProductID>P-619V-21c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Spatial and Graph (Apache Commons Fileupload)</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-619V-19c</ProductID>
            <ProductID>P-619V-21c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="463" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="463" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console (Apache Commons FileUpload)).  Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242(Console)V-12.2.1.3.0</ProductID>
            <ProductID>P-5242(Console)V-12.2.1.4.0</ProductID>
            <ProductID>P-5242(Console)V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242(Console)V-12.2.1.3.0</ProductID>
            <ProductID>P-5242(Console)V-12.2.1.4.0</ProductID>
            <ProductID>P-5242(Console)V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="464" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-24998</Title>
      <Notes>
         <Note Audience="All" Ordinal="464" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Third Party (Apache Commons FileUpload)).  Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and  14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-24998</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242(Third Party)V-12.2.1.3.0</ProductID>
            <ProductID>P-5242(Third Party)V-12.2.1.4.0</ProductID>
            <ProductID>P-5242(Third Party)V-14.1.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle WebLogic Server</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936090.2</URL>
            <ProductID>P-5242(Third Party)V-12.2.1.3.0</ProductID>
            <ProductID>P-5242(Third Party)V-12.2.1.4.0</ProductID>
            <ProductID>P-5242(Third Party)V-14.1.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="465" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25136</Title>
      <Notes>
         <Note Audience="All" Ordinal="465" Title="Details" Type="Details">Vulnerability in the Oracle Healthcare Translational Research product of Oracle HealthCare Applications (component: DataStudio (OpenSSH)).  Supported versions that are affected are 4.1.0 and  4.1.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Healthcare Translational Research.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Healthcare Translational Research as well as  unauthorized update, insert or delete access to some of Oracle Healthcare Translational Research accessible data. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25136</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.5</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Healthcare Translational Research</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939153.1</URL>
            <ProductID>P-9427V-4.1.0</ProductID>
            <ProductID>P-9427V-4.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="466" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25194</Title>
      <Notes>
         <Note Audience="All" Ordinal="466" Title="Details" Type="Details">Vulnerability in the Oracle Banking APIs product of Oracle Financial Services Applications (component: IDM - Authentication (Apache Kafka)).  Supported versions that are affected are 22.1 and  22.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking APIs.  Successful attacks of this vulnerability can result in takeover of Oracle Banking APIs. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25194</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13676V-22.1</ProductID>
            <ProductID>P-13676V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking APIs</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-13676V-22.1</ProductID>
            <ProductID>P-13676V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="467" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25194</Title>
      <Notes>
         <Note Audience="All" Ordinal="467" Title="Details" Type="Details">Vulnerability in the Oracle Banking Digital Experience product of Oracle Financial Services Applications (component: UI General (Apache Kafka)).  Supported versions that are affected are 22.1 and  22.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Digital Experience.  Successful attacks of this vulnerability can result in takeover of Oracle Banking Digital Experience. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25194</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Banking Digital Experience</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com</URL>
            <ProductID>P-12605V-22.1</ProductID>
            <ProductID>P-12605V-22.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="468" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25194</Title>
      <Notes>
         <Note Audience="All" Ordinal="468" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure (Apache Kafka)).  Supported versions that are affected are 8.0.7.0, 8.0.8.0, 8.0.9.0,
8.1.0.0, 8.1.1.0, 8.1.2.0,
8.1.2.1 and  8.1.2.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25194</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-8.0.7.0</ProductID>
            <ProductID>P-5680V-8.0.8.0</ProductID>
            <ProductID>P-5680V-8.0.9.0</ProductID>
            <ProductID>P-5680V-8.1.0.0</ProductID>
            <ProductID>P-5680V-8.1.1.0</ProductID>
            <ProductID>P-5680V-8.1.2.0</ProductID>
            <ProductID>P-5680V-8.1.2.1</ProductID>
            <ProductID>P-5680V-8.1.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Analytical Applications Infrastructure</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2939767.1</URL>
            <ProductID>P-5680V-8.0.7.0</ProductID>
            <ProductID>P-5680V-8.0.8.0</ProductID>
            <ProductID>P-5680V-8.0.9.0</ProductID>
            <ProductID>P-5680V-8.1.0.0</ProductID>
            <ProductID>P-5680V-8.1.1.0</ProductID>
            <ProductID>P-5680V-8.1.2.0</ProductID>
            <ProductID>P-5680V-8.1.2.1</ProductID>
            <ProductID>P-5680V-8.1.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="469" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25194</Title>
      <Notes>
         <Note Audience="All" Ordinal="469" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Behavior Detection Platform product of Oracle Financial Services Applications (component: Application (Apache Kafka)).  Supported versions that are affected are 8.0.8.1, 8.1.1.1, 8.1.2.3 and  8.1.2.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Behavior Detection Platform.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Behavior Detection Platform. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25194</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9190V-8.0.8.1</ProductID>
            <ProductID>P-9190V-8.1.1.1</ProductID>
            <ProductID>P-9190V-8.1.2.3</ProductID>
            <ProductID>P-9190V-8.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Behavior Detection Platform</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936356.1</URL>
            <ProductID>P-9190V-8.0.8.1</ProductID>
            <ProductID>P-9190V-8.1.1.1</ProductID>
            <ProductID>P-9190V-8.1.2.3</ProductID>
            <ProductID>P-9190V-8.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="470" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25194</Title>
      <Notes>
         <Note Audience="All" Ordinal="470" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Regulatory Reporting product of Oracle Financial Services Applications (component: Application (Apache Kafka)).  Supported versions that are affected are 8.0.8.1,  8.1.1.1, 8.1.2.3 and  8.1.2.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Regulatory Reporting.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Regulatory Reporting. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25194</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9142V-8.0.8.1</ProductID>
            <ProductID>P-9142V-8.1.1.1</ProductID>
            <ProductID>P-9142V-8.1.2.3</ProductID>
            <ProductID>P-9142V-8.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Regulatory Reporting</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936339.1</URL>
            <ProductID>P-9142V-8.0.8.1</ProductID>
            <ProductID>P-9142V-8.1.1.1</ProductID>
            <ProductID>P-9142V-8.1.2.3</ProductID>
            <ProductID>P-9142V-8.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="471" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25194</Title>
      <Notes>
         <Note Audience="All" Ordinal="471" Title="Details" Type="Details">Security-in-Depth issue in Oracle SQL Developer (component: Installation (Apache Kafka)). This vulnerability cannot be exploited in the context of this product.</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25194</CVE>
      <ProductStatuses>
         <Status Type="Known Not Affected">
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>0.0</BaseScore>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle SQL Developer</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2923348.1</URL>
            <ProductID>P-1875V-Prior to 23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="472" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25577</Title>
      <Notes>
         <Note Audience="All" Ordinal="472" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Core Policy product of Oracle Communications (component: Policy (Werkzeug)).  Supported versions that are affected are 22.4.0-22.4.4 and  23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Policy.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Policy. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25577</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Core Policy</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938436.1</URL>
            <ProductID>P-14277V-22.4.0-22.4.4</ProductID>
            <ProductID>P-14277V-23.1.0-23.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="473" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25613</Title>
      <Notes>
         <Note Audience="All" Ordinal="473" Title="Details" Type="Details">Vulnerability in the Oracle Communications Cloud Native Configuration Console product of Oracle Communications (component: Configuration (Apache Kerby)).  Supported versions that are affected are 22.4.1 and  23.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Configuration Console.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Configuration Console. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25613</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-14250V-22.4.1</ProductID>
            <ProductID>P-14250V-23.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Cloud Native Configuration Console</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938418.1</URL>
            <ProductID>P-14250V-22.4.1</ProductID>
            <ProductID>P-14250V-23.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="474" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25690</Title>
      <Notes>
         <Note Audience="All" Ordinal="474" Title="Details" Type="Details">Vulnerability in the Oracle Communications Element Manager product of Oracle Communications (component: FEServer (Apache HTTP Server)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Element Manager.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Element Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25690</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Element Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938441.1</URL>
            <ProductID>P-11052V-9.0.0</ProductID>
            <ProductID>P-11052V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="475" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-25690</Title>
      <Notes>
         <Note Audience="All" Ordinal="475" Title="Details" Type="Details">Vulnerability in the Oracle Communications Session Report Manager product of Oracle Communications (component: FEServer (Apache HTTP Server)).  Supported versions that are affected are 9.0.0 and  9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Session Report Manager.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Session Report Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-25690</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Session Report Manager</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938447.1</URL>
            <ProductID>P-10770V-9.0.0</ProductID>
            <ProductID>P-10770V-9.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="476" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-28708</Title>
      <Notes>
         <Note Audience="All" Ordinal="476" Title="Details" Type="Details">Vulnerability in the Oracle Communications Policy Management product of Oracle Communications (component: Core (Apache Tomcat)).   The supported version that is affected is 12.6.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Policy Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Communications Policy Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-28708</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Communications Policy Management</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2938443.1</URL>
            <ProductID>P-10900V-12.6.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="477" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2023-28708</Title>
      <Notes>
         <Note Audience="All" Ordinal="477" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Crime and Compliance Management Studio product of Oracle Financial Services Applications (component: Studio (Apache Tomcat)).   The supported version that is affected is 8.0.8.3.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Crime and Compliance Management Studio.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Financial Services Crime and Compliance Management Studio accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2023-28708</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13595V-8.0.8.3.5</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Oracle Financial Services Crime and Compliance Management Studio</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2936386.1</URL>
            <ProductID>P-13595V-8.0.8.3.5</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
</cvrf:cvrfdoc>
