<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1687073.xsl"?>
<?xml-stylesheet type="text/css" href="http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1686935.css"?>
<cvrf:cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
   <DocumentTitle xml:lang="en">Oracle Critical Patch Update Advisory - January 2013 - Beta Oracle CVRF</DocumentTitle>
   <DocumentType xml:lang="en">Oracle Critical Patch Update Advisory</DocumentType>
   <DocumentPublisher Type="Vendor"/>
   <DocumentTracking>
      <Identification>
         <ID>CPUJan2013</ID>
      </Identification>
      <Status>Final</Status>
      <Version>1.0</Version>
      <RevisionHistory>
         <Revision>
            <Number>1.0</Number>
            <Date>2013-01-15T13:00:00-07:00</Date>
            <Description>Initial Distribution</Description>
         </Revision>
      </RevisionHistory>
      <InitialReleaseDate>2013-01-15T13:00:00-07:00</InitialReleaseDate>
      <CurrentReleaseDate>2013-01-15T13:00:00-07:00</CurrentReleaseDate>
   </DocumentTracking>
   <DocumentNotes>
      <Note Audience="All" Ordinal="1" Title="Summary" Type="Summary" xml:lang="en">This document contains descriptions of Oracle product security vulnerabilities which have had fixes released for all supported versions and platforms for the associated product.  Additional information regarding these vulnerabilities including fix distribution information can be found at the Oracle sites referenced in this document.</Note>
   </DocumentNotes>
   <DocumentDistribution>This document is published at: http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1841213.xml</DocumentDistribution>
   <DocumentReferences>
      <Reference Type="External">
         <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
         <Description>URL to html version of Advisory</Description>
      </Reference>
   </DocumentReferences>
   <Acknowledgments>
      <Acknowledgment>
         <Name>Alexandr Polyakov</Name>
         <Organization>Digital Security</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Apple J4ck</Name>
         <Organization>Apple J4ck</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Benjamin Toews</Name>
         <Organization>Neohapsis, Inc.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>CERT/CC</Name>
         <Organization>CERT/CC</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dmitriy Pletnev</Name>
         <Organization>Secunia Research</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Esteban Martinez Fayo</Name>
         <Organization>Application Security, Inc.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Frank Stuart</Name>
         <Organization>Frank Stuart</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Greg Jenkins</Name>
         <Organization>NCC Group</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Juan Pablo Perez Etchegoyen</Name>
         <Organization>Onapsis</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Martin Carpenter</Name>
         <Organization>Citco</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Martin Rakhmanov</Name>
         <Organization>Application Security, Inc.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Paul M. Wright</Name>
         <Organization>Paul M. Wright</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Pavel Toporkov</Name>
         <Organization>Positive Technologies</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Piyush Mittal</Name>
         <Organization>PIYUSH MITTAL</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Qinglin Jiang</Name>
         <Organization>Application Security, Inc.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Robert Foggia</Name>
         <Organization>Trustwave</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Shashank Kumar</Name>
         <Organization>Shashank kumar</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Travis Emmert</Name>
         <Organization>Travis Emmert</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>an Anonymous Reporter</Name>
         <Organization>TippingPoint's Zero Day Initiative</Organization>
      </Acknowledgment>
   </Acknowledgments>
   <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
      <Branch Name="Oracle" Type="Vendor">
         <Branch Name="Oracle Database Mobile/Lite Server" Type="Product Family">
            <Branch Name="Oracle Database Mobile/Lite Server" Type="Product Name">
               <Branch Name="10.3.0.3" Type="Product Version">
                  <FullProductName ProductID="P-9620V-10.3.0.3">Oracle Database Mobile/Lite Server Version 10.3.0.3</FullProductName>
               </Branch>
               <Branch Name="11.1.0.0" Type="Product Version">
                  <FullProductName ProductID="P-9620V-11.1.0.0">Oracle Database Mobile/Lite Server Version 11.1.0.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Database Server" Type="Product Family">
            <Branch Name="Oracle Spatial" Type="Product Name">
               <Branch Name="10.2.0.3" Type="Product Version">
                  <FullProductName ProductID="P-619V-10.2.0.3">Oracle Spatial Version 10.2.0.3</FullProductName>
               </Branch>
               <Branch Name="10.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-619V-10.2.0.4">Oracle Spatial Version 10.2.0.4</FullProductName>
               </Branch>
               <Branch Name="10.2.0.5" Type="Product Version">
                  <FullProductName ProductID="P-619V-10.2.0.5">Oracle Spatial Version 10.2.0.5</FullProductName>
               </Branch>
               <Branch Name="11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-619V-11.1.0.7">Oracle Spatial Version 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="11.2.0.2" Type="Product Version">
                  <FullProductName ProductID="P-619V-11.2.0.2">Oracle Spatial Version 11.2.0.2</FullProductName>
               </Branch>
               <Branch Name="11.2.0.3" Type="Product Version">
                  <FullProductName ProductID="P-619V-11.2.0.3">Oracle Spatial Version 11.2.0.3</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle E-Business Suite" Type="Product Family">
            <Branch Name="Oracle Marketing" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-229V-11.5.10.2">Oracle Marketing Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.0.6">Oracle Marketing Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.1.1">Oracle Marketing Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.1.2">Oracle Marketing Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-229V-12.1.3">Oracle Marketing Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Payroll" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-506V-11.5.10.2">Oracle Payroll Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.0.6">Oracle Payroll Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.1.1">Oracle Payroll Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.1.2">Oracle Payroll Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-506V-12.1.3">Oracle Payroll Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Application Object Library" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-510V-11.5.10.2">Oracle Application Object Library Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.0.6">Oracle Application Object Library Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.1.3">Oracle Application Object Library Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Universal Work Queue" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-778V-11.5.10.2">Oracle Universal Work Queue Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-778V-12.0.6">Oracle Universal Work Queue Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-778V-12.1.1">Oracle Universal Work Queue Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-778V-12.1.2">Oracle Universal Work Queue Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-778V-12.1.3">Oracle Universal Work Queue Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle CRM Technical Foundation" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-1199V-11.5.10.2">Oracle CRM Technical Foundation Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.0.6">Oracle CRM Technical Foundation Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.1.3">Oracle CRM Technical Foundation Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Applications Framework" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-1472V-11.5.10.2">Oracle Applications Framework Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-1472V-12.0.6">Oracle Applications Framework Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1472V-12.1.3">Oracle Applications Framework Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Applications Technology Stack" Type="Product Name">
               <Branch Name="11.5.10.2" Type="Product Version">
                  <FullProductName ProductID="P-1745V-11.5.10.2">Oracle Applications Technology Stack Version 11.5.10.2</FullProductName>
               </Branch>
               <Branch Name="12.0.6" Type="Product Version">
                  <FullProductName ProductID="P-1745V-12.0.6">Oracle Applications Technology Stack Version 12.0.6</FullProductName>
               </Branch>
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1745V-12.1.3">Oracle Applications Technology Stack Version 12.1.3</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Enterprise Manager Grid Control" Type="Product Family">
            <Branch Name="Enterprise Manager for Oracle Database" Type="Product Name">
               <Branch Name="10.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-1366V-10.2.0.4">Enterprise Manager for Oracle Database Version 10.2.0.4</FullProductName>
               </Branch>
               <Branch Name="10.2.0.4; 10.2.0.5" Type="Product Version">
                  <FullProductName ProductID="P-1366V-10.2.0.4; 10.2.0.5">Enterprise Manager for Oracle Database Version 10.2.0.4; 10.2.0.5</FullProductName>
               </Branch>
               <Branch Name="10.2.0.5" Type="Product Version">
                  <FullProductName ProductID="P-1366V-10.2.0.5">Enterprise Manager for Oracle Database Version 10.2.0.5</FullProductName>
               </Branch>
               <Branch Name="11.1.0.1; EM DB Control: 10.2.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1366V-11.1.0.1; EM DB Control: 10.2.0.3">Enterprise Manager for Oracle Database Version 11.1.0.1; EM DB Control: 10.2.0.3</FullProductName>
               </Branch>
               <Branch Name="11.1.0.1; EM DB Control: 11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-1366V-11.1.0.1; EM DB Control: 11.1.0.7">Enterprise Manager for Oracle Database Version 11.1.0.1; EM DB Control: 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-1366V-11.1.0.7">Enterprise Manager for Oracle Database Version 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="11.2.0.2" Type="Product Version">
                  <FullProductName ProductID="P-1366V-11.2.0.2">Enterprise Manager for Oracle Database Version 11.2.0.2</FullProductName>
               </Branch>
               <Branch Name="11.2.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1366V-11.2.0.3">Enterprise Manager for Oracle Database Version 11.2.0.3</FullProductName>
               </Branch>
               <Branch Name="11.2.0.3; EM Plugin for DB: 12.1.0.1" Type="Product Version">
                  <FullProductName ProductID="P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1">Enterprise Manager for Oracle Database Version 11.2.0.3; EM Plugin for DB: 12.1.0.1</FullProductName>
               </Branch>
               <Branch Name="11.2.0.3;EM Plugin for DB: 12.1.0.2" Type="Product Version">
                  <FullProductName ProductID="P-1366V-11.2.0.3;EM Plugin for DB: 12.1.0.2">Enterprise Manager for Oracle Database Version 11.2.0.3;EM Plugin for DB: 12.1.0.2</FullProductName>
               </Branch>
               <Branch Name="12.1.0.1; EM DB Control: 11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-1366V-12.1.0.1; EM DB Control: 11.1.0.7">Enterprise Manager for Oracle Database Version 12.1.0.1; EM DB Control: 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="12.1.0.2" Type="Product Version">
                  <FullProductName ProductID="P-1366V-12.1.0.2">Enterprise Manager for Oracle Database Version 12.1.0.2</FullProductName>
               </Branch>
               <Branch Name="EM Base Platform: 10.2.0.5" Type="Product Version">
                  <FullProductName ProductID="P-1366V-EM Base Platform: 10.2.0.5">Enterprise Manager for Oracle Database Version EM Base Platform: 10.2.0.5</FullProductName>
               </Branch>
               <Branch Name="EM Base Platform: 11.1.0.1" Type="Product Version">
                  <FullProductName ProductID="P-1366V-EM Base Platform: 11.1.0.1">Enterprise Manager for Oracle Database Version EM Base Platform: 11.1.0.1</FullProductName>
               </Branch>
               <Branch Name="EM Plugin for DB: 12.1.0.1" Type="Product Version">
                  <FullProductName ProductID="P-1366V-EM Plugin for DB: 12.1.0.1">Enterprise Manager for Oracle Database Version EM Plugin for DB: 12.1.0.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager Base Platform" Type="Product Name">
               <Branch Name="10.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-1370V-10.2.0.4">Enterprise Manager Base Platform Version 10.2.0.4</FullProductName>
               </Branch>
               <Branch Name="10.2.0.5" Type="Product Version">
                  <FullProductName ProductID="P-1370V-10.2.0.5">Enterprise Manager Base Platform Version 10.2.0.5</FullProductName>
               </Branch>
               <Branch Name="11.1.0.1; EM DB Control: 11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-1370V-11.1.0.1; EM DB Control: 11.1.0.7">Enterprise Manager Base Platform Version 11.1.0.1; EM DB Control: 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-1370V-11.1.0.7">Enterprise Manager Base Platform Version 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="11.2.0.2" Type="Product Version">
                  <FullProductName ProductID="P-1370V-11.2.0.2">Enterprise Manager Base Platform Version 11.2.0.2</FullProductName>
               </Branch>
               <Branch Name="11.2.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1370V-11.2.0.3">Enterprise Manager Base Platform Version 11.2.0.3</FullProductName>
               </Branch>
               <Branch Name="11.2.0.3;EM Plugin for DB 12.1.0.1" Type="Product Version">
                  <FullProductName ProductID="P-1370V-11.2.0.3;EM Plugin for DB 12.1.0.1">Enterprise Manager Base Platform Version 11.2.0.3;EM Plugin for DB 12.1.0.1</FullProductName>
               </Branch>
               <Branch Name="EM Base Platform 10.2.0.5;EM DB Control: 11.1.0.7" Type="Product Version">
                  <FullProductName ProductID="P-1370V-EM Base Platform 10.2.0.5;EM DB Control: 11.1.0.7">Enterprise Manager Base Platform Version EM Base Platform 10.2.0.5;EM DB Control: 11.1.0.7</FullProductName>
               </Branch>
               <Branch Name="EM Base Platform: 10.2.0.5" Type="Product Version">
                  <FullProductName ProductID="P-1370V-EM Base Platform: 10.2.0.5">Enterprise Manager Base Platform Version EM Base Platform: 10.2.0.5</FullProductName>
               </Branch>
               <Branch Name="EM Base Platform: 10.2.0.5; EM DB Control: 10.2.0.3" Type="Product Version">
                  <FullProductName ProductID="P-1370V-EM Base Platform: 10.2.0.5; EM DB Control: 10.2.0.3">Enterprise Manager Base Platform Version EM Base Platform: 10.2.0.5; EM DB Control: 10.2.0.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="APM - Application Performance Management" Type="Product Name">
               <Branch Name="11.1" Type="Product Version">
                  <FullProductName ProductID="P-9572V-11.1">APM - Application Performance Management Version 11.1</FullProductName>
               </Branch>
               <Branch Name="12.1.0.2" Type="Product Version">
                  <FullProductName ProductID="P-9572V-12.1.0.2">APM - Application Performance Management Version 12.1.0.2</FullProductName>
               </Branch>
               <Branch Name="6.5" Type="Product Version">
                  <FullProductName ProductID="P-9572V-6.5">APM - Application Performance Management Version 6.5</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Fusion Middleware" Type="Product Family">
            <Branch Name="Oracle Help Technologies" Type="Product Name">
               <Branch Name="-" Type="Product Version">
                  <FullProductName ProductID="P-949V--">Oracle Help Technologies Version -</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Outside In Technology" Type="Product Name">
               <Branch Name="8.3.7" Type="Product Version">
                  <FullProductName ProductID="P-2276V-8.3.7">Oracle Outside In Technology Version 8.3.7</FullProductName>
               </Branch>
               <Branch Name="8.4" Type="Product Version">
                  <FullProductName ProductID="P-2276V-8.4">Oracle Outside In Technology Version 8.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Weblogic Server" Type="Product Name">
               <Branch Name="10.0.2" Type="Product Version">
                  <FullProductName ProductID="P-5242V-10.0.2">Oracle Weblogic Server Version 10.0.2</FullProductName>
               </Branch>
               <Branch Name="10.3.5" Type="Product Version">
                  <FullProductName ProductID="P-5242V-10.3.5">Oracle Weblogic Server Version 10.3.5</FullProductName>
               </Branch>
               <Branch Name="10.3.6" Type="Product Version">
                  <FullProductName ProductID="P-5242V-10.3.6">Oracle Weblogic Server Version 10.3.6</FullProductName>
               </Branch>
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.1.1">Oracle Weblogic Server Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="9.2.4" Type="Product Version">
                  <FullProductName ProductID="P-5242V-9.2.4">Oracle Weblogic Server Version 9.2.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle Access Manager" Type="Product Name">
               <Branch Name="10.1.4.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5565V-10.1.4.3.0">Oracle Access Manager Version 10.1.4.3.0</FullProductName>
               </Branch>
               <Branch Name="11.1.1.5.0" Type="Product Version">
                  <FullProductName ProductID="P-5565V-11.1.1.5.0">Oracle Access Manager Version 11.1.1.5.0</FullProductName>
               </Branch>
               <Branch Name="11.1.2.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5565V-11.1.2.0.0">Oracle Access Manager Version 11.1.2.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Oracle GoldenGate Veridata" Type="Product Name">
               <Branch Name="3.0.0.11.0" Type="Product Version">
                  <FullProductName ProductID="P-5758V-3.0.0.11.0">Oracle GoldenGate Veridata Version 3.0.0.11.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Management Pack for Oracle GoldenGate" Type="Product Name">
               <Branch Name="11.1.1.1.0" Type="Product Version">
                  <FullProductName ProductID="P-5759V-11.1.1.1.0">Management Pack for Oracle GoldenGate Version 11.1.1.1.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle JD Edwards Products" Type="Product Family">
            <Branch Name="JD Edwards EnterpriseOne Tools" Type="Product Name">
               <Branch Name="24" Type="Product Version">
                  <FullProductName ProductID="P-4781V-24">JD Edwards EnterpriseOne Tools Version 24</FullProductName>
               </Branch>
               <Branch Name="8.98" Type="Product Version">
                  <FullProductName ProductID="P-4781V-8.98">JD Edwards EnterpriseOne Tools Version 8.98</FullProductName>
               </Branch>
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-4781V-9.1">JD Edwards EnterpriseOne Tools Version 9.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle MySQL" Type="Product Family">
            <Branch Name="MySQL Server" Type="Product Name">
               <Branch Name="5.1.28 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.1.28 and earlier">MySQL Server Version 5.1.28 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.1.65 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.1.65 and earlier">MySQL Server Version 5.1.65 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.1.66 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.1.66 and earlier">MySQL Server Version 5.1.66 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.5.27 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.5.27 and earlier">MySQL Server Version 5.5.27 and earlier</FullProductName>
               </Branch>
               <Branch Name="5.5.28 and earlier" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.5.28 and earlier">MySQL Server Version 5.5.28 and earlier</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle PeopleSoft Products" Type="Product Family">
            <Branch Name="PeopleSoft Enterprise HRMS Candidate Gateway" Type="Product Name">
               <Branch Name="9.0" Type="Product Version">
                  <FullProductName ProductID="P-5043V-9.0">PeopleSoft Enterprise HRMS Candidate Gateway Version 9.0</FullProductName>
               </Branch>
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-5043V-9.1">PeopleSoft Enterprise HRMS Candidate Gateway Version 9.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise HRMS Human Resources" Type="Product Name">
               <Branch Name="9.1" Type="Product Version">
                  <FullProductName ProductID="P-5071V-9.1">PeopleSoft Enterprise HRMS Human Resources Version 9.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise PT PeopleTools" Type="Product Name">
               <Branch Name="8.51" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.51">PeopleSoft Enterprise PT PeopleTools Version 8.51</FullProductName>
               </Branch>
               <Branch Name="8.52" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.52">PeopleSoft Enterprise PT PeopleTools Version 8.52</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Siebel CRM" Type="Product Family">
            <Branch Name="Siebel Apps - Multichannel Technologies" Type="Product Name">
               <Branch Name="8.1.1" Type="Product Version">
                  <FullProductName ProductID="P-8975V-8.1.1">Siebel Apps - Multichannel Technologies Version 8.1.1</FullProductName>
               </Branch>
               <Branch Name="8.2.2" Type="Product Version">
                  <FullProductName ProductID="P-8975V-8.2.2">Siebel Apps - Multichannel Technologies Version 8.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Siebel Core - Server Infrastructure" Type="Product Name">
               <Branch Name="8.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9004V-8.1.1">Siebel Core - Server Infrastructure Version 8.1.1</FullProductName>
               </Branch>
               <Branch Name="8.2.2" Type="Product Version">
                  <FullProductName ProductID="P-9004V-8.2.2">Siebel Core - Server Infrastructure Version 8.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Siebel Core - Server OM Svcs" Type="Product Name">
               <Branch Name="8.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9006V-8.1.1">Siebel Core - Server OM Svcs Version 8.1.1</FullProductName>
               </Branch>
               <Branch Name="8.2.2" Type="Product Version">
                  <FullProductName ProductID="P-9006V-8.2.2">Siebel Core - Server OM Svcs Version 8.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Siebel UI Framework" Type="Product Name">
               <Branch Name="8.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9011V-8.1.1">Siebel UI Framework Version 8.1.1</FullProductName>
               </Branch>
               <Branch Name="8.2.2" Type="Product Version">
                  <FullProductName ProductID="P-9011V-8.2.2">Siebel UI Framework Version 8.2.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Siebel Calendar" Type="Product Name">
               <Branch Name="8.1.1" Type="Product Version">
                  <FullProductName ProductID="P-9747V-8.1.1">Siebel Calendar Version 8.1.1</FullProductName>
               </Branch>
               <Branch Name="8.2.2" Type="Product Version">
                  <FullProductName ProductID="P-9747V-8.2.2">Siebel Calendar Version 8.2.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Sun Products Suite" Type="Product Family">
            <Branch Name="Solaris Operating System" Type="Product Name">
               <Branch Name="10" Type="Product Version">
                  <FullProductName ProductID="P-10006V-10">Solaris Operating System Version 10</FullProductName>
               </Branch>
               <Branch Name="11" Type="Product Version">
                  <FullProductName ProductID="P-10006V-11">Solaris Operating System Version 11</FullProductName>
               </Branch>
               <Branch Name="9" Type="Product Version">
                  <FullProductName ProductID="P-10006V-9">Solaris Operating System Version 9</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Sun Storage Common Array Manager (CAM)" Type="Product Name">
               <Branch Name="6.9.0" Type="Product Version">
                  <FullProductName ProductID="P-10024V-6.9.0">Sun Storage Common Array Manager (CAM) Version 6.9.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Supply Chain Products Suite" Type="Product Family">
            <Branch Name="Oracle Agile PLM Framework" Type="Product Name">
               <Branch Name="9.3.1.1" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.1.1">Oracle Agile PLM Framework Version 9.3.1.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Virtualization" Type="Product Family">
            <Branch Name="Oracle VM VirtualBox" Type="Product Name">
               <Branch Name="4.0" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.0">Oracle VM VirtualBox Version 4.0</FullProductName>
               </Branch>
               <Branch Name="4.1" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.1">Oracle VM VirtualBox Version 4.1</FullProductName>
               </Branch>
               <Branch Name="4.2" Type="Product Version">
                  <FullProductName ProductID="P-8370V-4.2">Oracle VM VirtualBox Version 4.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
      </Branch>
   </ProductTree>
   <Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2011-5035</Title>
      <Notes>
         <Note Audience="All" Ordinal="1" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Container).  Supported versions that are affected are 9.2.4, 10.0.2, 10.3.5, 10.3.6 and  12.1.1. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2011-5035</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-9.2.4</ProductID>
            <ProductID>P-5242V-10.0.2</ProductID>
            <ProductID>P-5242V-10.3.5</ProductID>
            <ProductID>P-5242V-10.3.6</ProductID>
            <ProductID>P-5242V-12.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5242V-9.2.4</ProductID>
            <ProductID>P-5242V-10.0.2</ProductID>
            <ProductID>P-5242V-10.3.5</ProductID>
            <ProductID>P-5242V-10.3.6</ProductID>
            <ProductID>P-5242V-12.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-0022</Title>
      <Notes>
         <Note Audience="All" Ordinal="2" Title="Details" Type="Details">Vulnerability in the Oracle GoldenGate Veridata component of Oracle Fusion Middleware (subcomponent: Server).   The supported version that is affected is 3.0.0.11.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GoldenGate Veridata.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-0022</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5758V-3.0.0.11.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5758V-3.0.0.11.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-0022</Title>
      <Notes>
         <Note Audience="All" Ordinal="3" Title="Details" Type="Details">Vulnerability in the Management Pack for Oracle GoldenGate component of Oracle Fusion Middleware (subcomponent: Server).   The supported version that is affected is 11.1.1.1.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Management Pack for Oracle GoldenGate.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-0022</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5759V-11.1.1.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5759V-11.1.1.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-0569</Title>
      <Notes>
         <Note Audience="All" Ordinal="4" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Install/smpatch).   The supported version that is affected is 10. Difficult to exploit vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Solaris accessible data as well as  read access to a subset of Solaris accessible data.  CVSS Base Score 3.3 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:L/AC:M/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-0569</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.3</BaseScore>
            <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-0572</Title>
      <Notes>
         <Note Audience="All" Ordinal="5" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-0572</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-0574</Title>
      <Notes>
         <Note Audience="All" Ordinal="6" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-0574</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-0578</Title>
      <Notes>
         <Note Audience="All" Ordinal="7" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Optimizer).  Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-0578</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-1677</Title>
      <Notes>
         <Note Audience="All" Ordinal="8" Title="Details" Type="Details">Vulnerability in the Oracle Application Server Single Sign-On component of Oracle Fusion Middleware (subcomponent: None). For supported versions that are affected see note. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Application Server Single Sign-On accessible data.   Note: Fixed in all supported releases and patchsets. CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-1677</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-949V--</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-949V--</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-1678</Title>
      <Notes>
         <Note Audience="All" Ordinal="9" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Enterprise Infrastructure SEC).  Supported versions that are affected are 8.98, 9.1 and 24. Difficult to exploit vulnerability allows successful authenticated network attacks via JDENET.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of JD Edwards EnterpriseOne Tools accessible data.  CVSS Base Score 3.5 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-1678</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-8.98</ProductID>
            <ProductID>P-4781V-9.1</ProductID>
            <ProductID>P-4781V-24</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-4781V-8.98</ProductID>
            <ProductID>P-4781V-9.1</ProductID>
            <ProductID>P-4781V-24</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-1680</Title>
      <Notes>
         <Note Audience="All" Ordinal="10" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Siebel Apps - Multi-channel Technologies).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Siebel CRM accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-1680</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8975V-8.1.1</ProductID>
            <ProductID>P-8975V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8975V-8.1.1</ProductID>
            <ProductID>P-8975V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-1700</Title>
      <Notes>
         <Note Audience="All" Ordinal="11" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Siebel UI Framework).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Siebel CRM accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-1700</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9011V-8.1.1</ProductID>
            <ProductID>P-9011V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9011V-8.1.1</ProductID>
            <ProductID>P-9011V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-1701</Title>
      <Notes>
         <Note Audience="All" Ordinal="12" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Highly Interactive Web UI).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Siebel CRM accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-1701</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9011V-8.1.1</ProductID>
            <ProductID>P-9011V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9011V-8.1.1</ProductID>
            <ProductID>P-9011V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-1702</Title>
      <Notes>
         <Note Audience="All" Ordinal="13" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-1702</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="14" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-1705</Title>
      <Notes>
         <Note Audience="All" Ordinal="14" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Optimizer).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-1705</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="15" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-1755</Title>
      <Notes>
         <Note Audience="All" Ordinal="15" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: PeopleBooks - PSOL).   The supported version that is affected is 8.51. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-1755</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.51</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.51</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="16" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3168</Title>
      <Notes>
         <Note Audience="All" Ordinal="16" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Siebel Core - Server Infrastructure).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Siebel CRM.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3168</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9004V-8.1.1</ProductID>
            <ProductID>P-9004V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9004V-8.1.1</ProductID>
            <ProductID>P-9004V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="17" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3169</Title>
      <Notes>
         <Note Audience="All" Ordinal="17" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Siebel Core - Server Infrastructure).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP .  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Siebel CRM.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3169</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9004V-8.1.1</ProductID>
            <ProductID>P-9004V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9004V-8.1.1</ProductID>
            <ProductID>P-9004V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="18" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3170</Title>
      <Notes>
         <Note Audience="All" Ordinal="18" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Siebel Core - Server Infrastructure).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Siebel CRM.  CVSS Base Score 5.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3170</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9004V-8.1.1</ProductID>
            <ProductID>P-9004V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9004V-8.1.1</ProductID>
            <ProductID>P-9004V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="19" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3172</Title>
      <Notes>
         <Note Audience="All" Ordinal="19" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Siebel Apps - Multi-channel Technologies).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Siebel CRM.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3172</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8975V-8.1.1</ProductID>
            <ProductID>P-8975V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8975V-8.1.1</ProductID>
            <ProductID>P-8975V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="20" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3178</Title>
      <Notes>
         <Note Audience="All" Ordinal="20" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Kernel).   The supported version that is affected is 11. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris.  CVSS Base Score 2.1 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3178</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.1</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10006V-11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="21" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3190</Title>
      <Notes>
         <Note Audience="All" Ordinal="21" Title="Details" Type="Details">Vulnerability in the Oracle Universal Work Queue component of Oracle E-Business Suite (subcomponent: UWQ Server Issues).  Supported versions that are affected are 11.5.10.2, 12.0.6, 12.1.1, 12.1.2 and  12.1.3. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all Oracle Universal Work Queue accessible data as well as  read access to all Oracle Universal Work Queue accessible data.  CVSS Base Score 6.4 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P+/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3190</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-778V-11.5.10.2</ProductID>
            <ProductID>P-778V-12.0.6</ProductID>
            <ProductID>P-778V-12.1.1</ProductID>
            <ProductID>P-778V-12.1.2</ProductID>
            <ProductID>P-778V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.4</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-778V-11.5.10.2</ProductID>
            <ProductID>P-778V-12.0.6</ProductID>
            <ProductID>P-778V-12.1.1</ProductID>
            <ProductID>P-778V-12.1.2</ProductID>
            <ProductID>P-778V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="22" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3192</Title>
      <Notes>
         <Note Audience="All" Ordinal="22" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: RTE - Rich Text Editor).  Supported versions that are affected are 8.51 and  8.52. Difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data.  CVSS Base Score 3.5 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3192</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="23" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3218</Title>
      <Notes>
         <Note Audience="All" Ordinal="23" Title="Details" Type="Details">Vulnerability in the Human Resources component of Oracle E-Business Suite (subcomponent: Security Groups).  Supported versions that are affected are 11.5.10.2, 12.0.6 and  12.1.3. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Human Resources accessible data as well as  read access to a subset of Human Resources accessible data.  CVSS Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3218</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-510V-11.5.10.2</ProductID>
            <ProductID>P-510V-12.0.6</ProductID>
            <ProductID>P-510V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-510V-11.5.10.2</ProductID>
            <ProductID>P-510V-12.0.6</ProductID>
            <ProductID>P-510V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="24" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3219</Title>
      <Notes>
         <Note Audience="All" Ordinal="24" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Storage Management).  Supported versions that are affected are EM Base Platform: 10.2.0.5, 11.1.0.1; EM DB Control: 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3; 
EM Plugin for DB: 12.1.0.1 and  12.1.0.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3219</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4</ProductID>
            <ProductID>P-1366V-10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4</ProductID>
            <ProductID>P-1366V-10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="25" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-3220</Title>
      <Notes>
         <Note Audience="All" Ordinal="25" Title="Details" Type="Details">Vulnerability in the Spatial component of Oracle Database Server.  This vulnerability requires Create Table privileges for a successful attack.  Supported versions that are affected are 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2 and  11.2.0.3. Easily exploitable vulnerability allows successful authenticated network attacks via Oracle Net.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: The CVSS Base Score is 9.0 only for Windows. For Linux, Unix and other platforms, the CVSS Base Score is 6.5, and the impacts for Confidentiality, Integrity and Availability are Partial+. CVSS Base Score 9.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-3220</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-619V-10.2.0.3</ProductID>
            <ProductID>P-619V-10.2.0.4</ProductID>
            <ProductID>P-619V-10.2.0.5</ProductID>
            <ProductID>P-619V-11.1.0.7</ProductID>
            <ProductID>P-619V-11.2.0.2</ProductID>
            <ProductID>P-619V-11.2.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-619V-10.2.0.3</ProductID>
            <ProductID>P-619V-10.2.0.4</ProductID>
            <ProductID>P-619V-10.2.0.5</ProductID>
            <ProductID>P-619V-11.1.0.7</ProductID>
            <ProductID>P-619V-11.2.0.2</ProductID>
            <ProductID>P-619V-11.2.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="26" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-5059</Title>
      <Notes>
         <Note Audience="All" Ordinal="26" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: Portal).  Supported versions that are affected are 8.51 and  8.52. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-5059</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="27" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-5060</Title>
      <Notes>
         <Note Audience="All" Ordinal="27" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: GIS Extension).  Supported versions that are affected are 5.1.65 and earlier and  5.5.27 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 6.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-5060</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.65 and earlier</ProductID>
            <ProductID>P-8478V-5.5.27 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.65 and earlier</ProductID>
            <ProductID>P-8478V-5.5.27 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="28" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-5062</Title>
      <Notes>
         <Note Audience="All" Ordinal="28" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: User Interface Framework).  Supported versions that are affected are EM Base Platform: 10.2.0.5; 
EM DB Control: 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2 and  11.2.0.3. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-5062</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-EM Base Platform: 10.2.0.5; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1370V-10.2.0.4</ProductID>
            <ProductID>P-1370V-10.2.0.5</ProductID>
            <ProductID>P-1370V-11.1.0.7</ProductID>
            <ProductID>P-1370V-11.2.0.2</ProductID>
            <ProductID>P-1370V-11.2.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1370V-EM Base Platform: 10.2.0.5; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1370V-10.2.0.4</ProductID>
            <ProductID>P-1370V-10.2.0.5</ProductID>
            <ProductID>P-1370V-11.1.0.7</ProductID>
            <ProductID>P-1370V-11.2.0.2</ProductID>
            <ProductID>P-1370V-11.2.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="29" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-5096</Title>
      <Notes>
         <Note Audience="All" Ordinal="29" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Privileges).  Supported versions that are affected are 5.5.28 and earlier. Difficult to exploit vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 3.5 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-5096</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.5</BaseScore>
            <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="30" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-5097</Title>
      <Notes>
         <Note Audience="All" Ordinal="30" Title="Details" Type="Details">Vulnerability in the Oracle Access Manager component of Oracle Fusion Middleware (subcomponent: OAM Webgate).  Supported versions that are affected are 10.1.4.3.0, 11.1.1.5.0 and  11.1.2.0.0. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Access Manager accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-5097</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5565V-10.1.4.3.0</ProductID>
            <ProductID>P-5565V-11.1.1.5.0</ProductID>
            <ProductID>P-5565V-11.1.2.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5565V-10.1.4.3.0</ProductID>
            <ProductID>P-5565V-11.1.1.5.0</ProductID>
            <ProductID>P-5565V-11.1.2.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="31" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-5611</Title>
      <Notes>
         <Note Audience="All" Ordinal="31" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Privileges).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: The CVSS Base Score is 9.0 only for Windows. For Linux, Unix and other platforms, the CVSS Base Score is 6.5, and the impacts for Confidentiality, Integrity and Availability are Partial+. CVSS Base Score 9.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-5611</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="32" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2012-5612</Title>
      <Notes>
         <Note Audience="All" Ordinal="32" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Parser).  Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: The CVSS Base Score is 9.0 only for Windows. For Linux, Unix and other platforms, the CVSS Base Score is 6.5, and the impacts for Confidentiality, Integrity and Availability are Partial+. CVSS Base Score 9.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2012-5612</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>9.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="33" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0352</Title>
      <Notes>
         <Note Audience="All" Ordinal="33" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Content Management).  Supported versions that are affected are EM Base Platform: 10.2.0.5, 11.1.0.1; 
EM DB Control: 10.2.0.3, 10.2.0.4; 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3,
EM Plugin for DB: 12.1.0.1 and  12.1.0.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0352</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4; 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3</ProductID>
            <ProductID>P-1366V-EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4; 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3</ProductID>
            <ProductID>P-1366V-EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="34" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0353</Title>
      <Notes>
         <Note Audience="All" Ordinal="34" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Enterprise Configuration Management).  Supported versions that are affected are EM Base Platform: 10.2.0.5, 11.1.0.1; 
EM DB Control: 11.1.0.7, 11.2.0.2 and  11.2.0.3;
EM Plugin for DB 12.1.0.1. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0353</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1370V-11.1.0.1; EM DB Control: 11.1.0.7</ProductID>
            <ProductID>P-1370V-11.2.0.2</ProductID>
            <ProductID>P-1370V-11.2.0.3;EM Plugin for DB 12.1.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1370V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1370V-11.1.0.1; EM DB Control: 11.1.0.7</ProductID>
            <ProductID>P-1370V-11.2.0.2</ProductID>
            <ProductID>P-1370V-11.2.0.3;EM Plugin for DB 12.1.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="35" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0354</Title>
      <Notes>
         <Note Audience="All" Ordinal="35" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Policy Framework).  Supported versions that are affected are EM Base Platform 10.2.0.5;
EM DB Control: 11.1.0.7, 11.2.0.2 and  11.2.0.3. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0354</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-EM Base Platform 10.2.0.5;EM DB Control: 11.1.0.7</ProductID>
            <ProductID>P-1370V-11.2.0.2</ProductID>
            <ProductID>P-1370V-11.2.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1370V-EM Base Platform 10.2.0.5;EM DB Control: 11.1.0.7</ProductID>
            <ProductID>P-1370V-11.2.0.2</ProductID>
            <ProductID>P-1370V-11.2.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="36" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0355</Title>
      <Notes>
         <Note Audience="All" Ordinal="36" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Distributed/Cross DB Features).  Supported versions that are affected are EM Base Platform: 10.2.0.5, 11.1.0.1; 
EM DB Control: 11.1.0.7, 11.2.0.2 and  11.2.0.3. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0355</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="37" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0356</Title>
      <Notes>
         <Note Audience="All" Ordinal="37" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology).  Supported versions that are affected are 8.51 and  8.52. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0356</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="38" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0357</Title>
      <Notes>
         <Note Audience="All" Ordinal="38" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: PIA Core Technology).   The supported version that is affected is 8.52. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0357</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="39" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0358</Title>
      <Notes>
         <Note Audience="All" Ordinal="39" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Resource Manager).  Supported versions that are affected are EM Base Platform: 10.2.0.5, 11.1.0.1; 
EM DB Control: 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3; 
EM Plugin for DB: 12.1.0.1 and  12.1.0.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4</ProductID>
            <ProductID>P-1366V-10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4</ProductID>
            <ProductID>P-1366V-10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="40" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0359</Title>
      <Notes>
         <Note Audience="All" Ordinal="40" Title="Details" Type="Details">Vulnerability in the APM - Application Performance Management component of Oracle Enterprise Manager Grid Control (subcomponent: Business Transaction Management).  Supported versions that are affected are 6.5, 11.1 and  12.1.0.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized takeover of APM - Application Performance Management possibly including arbitrary code execution within the APM - Application Performance Management.  CVSS Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).  Oracle Vector: (AV:N/AC:L/Au:N/C:P+/I:P+/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0359</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9572V-6.5</ProductID>
            <ProductID>P-9572V-11.1</ProductID>
            <ProductID>P-9572V-12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.5</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9572V-6.5</ProductID>
            <ProductID>P-9572V-11.1</ProductID>
            <ProductID>P-9572V-12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="41" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0360</Title>
      <Notes>
         <Note Audience="All" Ordinal="41" Title="Details" Type="Details">Vulnerability in the APM - Application Performance Management component of Oracle Enterprise Manager Grid Control (subcomponent: Business Transaction Management).  Supported versions that are affected are 6.5, 11.1 and  12.1.0.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all APM - Application Performance Management accessible data.  CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0360</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9572V-6.5</ProductID>
            <ProductID>P-9572V-11.1</ProductID>
            <ProductID>P-9572V-12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9572V-6.5</ProductID>
            <ProductID>P-9572V-11.1</ProductID>
            <ProductID>P-9572V-12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="42" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0361</Title>
      <Notes>
         <Note Audience="All" Ordinal="42" Title="Details" Type="Details">Vulnerability in the Mobile Server component of Oracle Database Mobile/Lite Server.  Supported versions that are affected are 10.3.0.3 and  11.1.0.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Oracle Database Mobile Server was formerly known as Oracle Database Lite for 10g. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0361</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="43" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0362</Title>
      <Notes>
         <Note Audience="All" Ordinal="43" Title="Details" Type="Details">Vulnerability in the Mobile Server component of Oracle Database Mobile/Lite Server.  Supported versions that are affected are 10.3.0.3 and  11.1.0.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to any arbitrary Operating System location.   Note: Oracle Database Mobile Server was formerly known as Oracle Database Lite for 10g. CVSS Base Score 7.8 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="44" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0363</Title>
      <Notes>
         <Note Audience="All" Ordinal="44" Title="Details" Type="Details">Vulnerability in the Mobile Server component of Oracle Database Mobile/Lite Server.  Supported versions that are affected are 10.3.0.3 and  11.1.0.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to any arbitrary Operating System location.   Note: Oracle Database Mobile Server was formerly known as Oracle Database Lite for 10g. CVSS Base Score 7.8 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0363</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="45" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0364</Title>
      <Notes>
         <Note Audience="All" Ordinal="45" Title="Details" Type="Details">Vulnerability in the Mobile Server component of Oracle Database Mobile/Lite Server.  Supported versions that are affected are 10.3.0.3 and  11.1.0.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to any arbitrary Operating System location.   Note: Oracle Database Mobile Server was formerly known as Oracle Database Lite for 10g. CVSS Base Score 7.8 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0364</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>7.8</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="46" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0365</Title>
      <Notes>
         <Note Audience="All" Ordinal="46" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Security).  Supported versions that are affected are 8.1.1 and  8.2.2. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Siebel CRM accessible data.  CVSS Base Score 4.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0365</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9006V-8.1.1</ProductID>
            <ProductID>P-9006V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9006V-8.1.1</ProductID>
            <ProductID>P-9006V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="47" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0366</Title>
      <Notes>
         <Note Audience="All" Ordinal="47" Title="Details" Type="Details">Vulnerability in the Mobile Server component of Oracle Database Mobile/Lite Server.  Supported versions that are affected are 10.3.0.3 and  11.1.0.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.   Note: Oracle Database Mobile Server was formerly known as Oracle Database Lite for 10g. CVSS Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).  Oracle Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0366</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>10.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9620V-10.3.0.3</ProductID>
            <ProductID>P-9620V-11.1.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="48" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0367</Title>
      <Notes>
         <Note Audience="All" Ordinal="48" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Partition).  Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0367</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="49" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0368</Title>
      <Notes>
         <Note Audience="All" Ordinal="49" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).  Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0368</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="50" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0369</Title>
      <Notes>
         <Note Audience="All" Ordinal="50" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: Query).  Supported versions that are affected are 8.51 and  8.52. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data as well as  read access to a subset of PeopleSoft PeopleTools accessible data.  CVSS Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0369</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="51" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0370</Title>
      <Notes>
         <Note Audience="All" Ordinal="51" Title="Details" Type="Details">Vulnerability in the Oracle Agile PLM Framework component of Oracle Supply Chain Products Suite (subcomponent: Security).   The supported version that is affected is 9.3.1.1. Very difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Oracle Agile PLM Framework accessible data.  CVSS Base Score 2.1 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:S/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:H/Au:S/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0370</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4461V-9.3.1.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.1</BaseScore>
            <Vector>AV:N/AC:H/Au:S/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-4461V-9.3.1.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="52" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0371</Title>
      <Notes>
         <Note Audience="All" Ordinal="52" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM).  Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.  CVSS Base Score 4.0 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0371</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="53" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0372</Title>
      <Notes>
         <Note Audience="All" Ordinal="53" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Distributed/Cross DB Features).  Supported versions that are affected are EM Base Platform: 11.1.0.1, 12.1.0.1; 
EM DB Control: 11.1.0.7, 11.2.0.2 and  11.2.0.3;
EM Plugin for DB: 12.1.0.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0372</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1366V-EM Base Platform: 11.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.1; EM DB Control: 11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3;EM Plugin for DB: 12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1366V-EM Base Platform: 11.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.1; EM DB Control: 11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3;EM Plugin for DB: 12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="54" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0373</Title>
      <Notes>
         <Note Audience="All" Ordinal="54" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Distributed/Cross DB Features).  Supported versions that are affected are EM Base Platform: 10.2.0.5, 11.1.0.1; 
EM DB Control: 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3; 
EM Plugin for DB: 12.1.0.1 and  12.1.0.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0373</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4</ProductID>
            <ProductID>P-1366V-10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4</ProductID>
            <ProductID>P-1366V-10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="55" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0374</Title>
      <Notes>
         <Note Audience="All" Ordinal="55" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform component of Oracle Enterprise Manager Grid Control (subcomponent: Database Cloning).  Supported versions that are affected are EM Base Platform: 10.2.0.5, 11.1.0.1; EM DB Control: 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3; EM Plugin for DB: 12.1.0.1 and  12.1.0.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Enterprise Manager Base Platform accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0374</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4</ProductID>
            <ProductID>P-1366V-10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1366V-EM Base Platform: 10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.1; EM DB Control: 10.2.0.3</ProductID>
            <ProductID>P-1366V-10.2.0.4</ProductID>
            <ProductID>P-1366V-10.2.0.5</ProductID>
            <ProductID>P-1366V-11.1.0.7</ProductID>
            <ProductID>P-1366V-11.2.0.2</ProductID>
            <ProductID>P-1366V-11.2.0.3; EM Plugin for DB: 12.1.0.1</ProductID>
            <ProductID>P-1366V-12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="56" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0375</Title>
      <Notes>
         <Note Audience="All" Ordinal="56" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Replication).  Supported versions that are affected are 5.1.66 and earlier and  5.1.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all MySQL Server accessible data as well as  read access to all MySQL Server accessible data.  CVSS Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P+/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0375</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.1.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.1.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="57" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0376</Title>
      <Notes>
         <Note Audience="All" Ordinal="57" Title="Details" Type="Details">Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: Diagnostics).  Supported versions that are affected are 11.5.10.2, 12.0.6 and  12.1.3. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Applications Framework accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0376</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1472V-11.5.10.2</ProductID>
            <ProductID>P-1472V-12.0.6</ProductID>
            <ProductID>P-1472V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1472V-11.5.10.2</ProductID>
            <ProductID>P-1472V-12.0.6</ProductID>
            <ProductID>P-1472V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="58" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0377</Title>
      <Notes>
         <Note Audience="All" Ordinal="58" Title="Details" Type="Details">Vulnerability in the Oracle Applications Technology Stack component of Oracle E-Business Suite (subcomponent: Client System Analyzer).  Supported versions that are affected are 11.5.10.2, 12.0.6 and  12.1.3. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Applications Technology Stack accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0377</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1745V-11.5.10.2</ProductID>
            <ProductID>P-1745V-12.0.6</ProductID>
            <ProductID>P-1745V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1745V-11.5.10.2</ProductID>
            <ProductID>P-1745V-12.0.6</ProductID>
            <ProductID>P-1745V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="59" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0378</Title>
      <Notes>
         <Note Audience="All" Ordinal="59" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Siebel Calendar).  Supported versions that are affected are 8.1.1 and  8.2.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Siebel CRM accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0378</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9747V-8.1.1</ProductID>
            <ProductID>P-9747V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9747V-8.1.1</ProductID>
            <ProductID>P-9747V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="60" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0379</Title>
      <Notes>
         <Note Audience="All" Ordinal="60" Title="Details" Type="Details">Vulnerability in the Siebel CRM component of Oracle Siebel CRM (subcomponent: Siebel Calendar).  Supported versions that are affected are 8.1.1 and  8.2.2. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Siebel CRM accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0379</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9747V-8.1.1</ProductID>
            <ProductID>P-9747V-8.2.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9747V-8.1.1</ProductID>
            <ProductID>P-9747V-8.2.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="61" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0380</Title>
      <Notes>
         <Note Audience="All" Ordinal="61" Title="Details" Type="Details">Vulnerability in the Oracle Payroll component of Oracle E-Business Suite (subcomponent: View Payslip).  Supported versions that are affected are 11.5.10.2, 12.0.6, 12.1.1, 12.1.2 and  12.1.3. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Payroll accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0380</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-506V-11.5.10.2</ProductID>
            <ProductID>P-506V-12.0.6</ProductID>
            <ProductID>P-506V-12.1.1</ProductID>
            <ProductID>P-506V-12.1.2</ProductID>
            <ProductID>P-506V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-506V-11.5.10.2</ProductID>
            <ProductID>P-506V-12.0.6</ProductID>
            <ProductID>P-506V-12.1.1</ProductID>
            <ProductID>P-506V-12.1.2</ProductID>
            <ProductID>P-506V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="62" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0381</Title>
      <Notes>
         <Note Audience="All" Ordinal="62" Title="Details" Type="Details">Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Application Framework).  Supported versions that are affected are 11.5.10.2, 12.0.6 and  12.1.3. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all Oracle CRM Technical Foundation accessible data as well as  read access to all Oracle CRM Technical Foundation accessible data.  CVSS Base Score 6.4 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P+/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0381</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1199V-11.5.10.2</ProductID>
            <ProductID>P-1199V-12.0.6</ProductID>
            <ProductID>P-1199V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.4</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1199V-11.5.10.2</ProductID>
            <ProductID>P-1199V-12.0.6</ProductID>
            <ProductID>P-1199V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="63" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0382</Title>
      <Notes>
         <Note Audience="All" Ordinal="63" Title="Details" Type="Details">Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: Campaign Management).  Supported versions that are affected are 11.5.10.2, 12.0.6, 12.1.1, 12.1.2 and  12.1.3. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all Oracle Marketing accessible data as well as  read access to all Oracle Marketing accessible data.  CVSS Base Score 6.4 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P+/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0382</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-229V-11.5.10.2</ProductID>
            <ProductID>P-229V-12.0.6</ProductID>
            <ProductID>P-229V-12.1.1</ProductID>
            <ProductID>P-229V-12.1.2</ProductID>
            <ProductID>P-229V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.4</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-229V-11.5.10.2</ProductID>
            <ProductID>P-229V-12.0.6</ProductID>
            <ProductID>P-229V-12.1.1</ProductID>
            <ProductID>P-229V-12.1.2</ProductID>
            <ProductID>P-229V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="64" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0383</Title>
      <Notes>
         <Note Audience="All" Ordinal="64" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Locking).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server.  CVSS Base Score 4.3 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0383</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="65" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0384</Title>
      <Notes>
         <Note Audience="All" Ordinal="65" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Information Schema).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 6.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0384</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="66" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0385</Title>
      <Notes>
         <Note Audience="All" Ordinal="66" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Replication).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized  write access to any arbitrary Operating System location as well as  read access to any arbitrary Operating System location.  CVSS Base Score 6.6 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:N).  Oracle Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0385</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.6</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="67" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0386</Title>
      <Notes>
         <Note Audience="All" Ordinal="67" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure).  Supported versions that are affected are 5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 6.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0386</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="68" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0387</Title>
      <Notes>
         <Note Audience="All" Ordinal="68" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: PeopleCode).  Supported versions that are affected are 8.51 and  8.52. Difficult to exploit vulnerability allows successful network attacks via HTTP, requiring multiple authentications.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data as well as  read access to a subset of PeopleSoft PeopleTools accessible data.  CVSS Base Score 4.3 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:M/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:M/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0387</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:M/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="69" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0388</Title>
      <Notes>
         <Note Audience="All" Ordinal="69" Title="Details" Type="Details">Vulnerability in the PeopleSoft HRMS component of Oracle PeopleSoft Products (subcomponent: Mobile Company Directory).   The supported version that is affected is 9.1. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft HRMS accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0388</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5071V-9.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5071V-9.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="70" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0389</Title>
      <Notes>
         <Note Audience="All" Ordinal="70" Title="Details" Type="Details">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server Optimizer).  Supported versions that are affected are 5.1.66 and earlier and  5.5.28 and earlier. Easily exploitable vulnerability allows successful authenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 6.8 (Availability impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0389</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.8</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8478V-5.1.66 and earlier</ProductID>
            <ProductID>P-8478V-5.5.28 and earlier</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="71" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0390</Title>
      <Notes>
         <Note Audience="All" Ordinal="71" Title="Details" Type="Details">Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: Bookmarkable Pages).  Supported versions that are affected are 11.5.10.2, 12.0.6 and  12.1.3. Very difficult to exploit vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Applications Framework accessible data.  CVSS Base Score 2.1 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:H/Au:S/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:H/Au:S/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0390</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1472V-11.5.10.2</ProductID>
            <ProductID>P-1472V-12.0.6</ProductID>
            <ProductID>P-1472V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.1</BaseScore>
            <Vector>AV:N/AC:H/Au:S/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1472V-11.5.10.2</ProductID>
            <ProductID>P-1472V-12.0.6</ProductID>
            <ProductID>P-1472V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="72" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0391</Title>
      <Notes>
         <Note Audience="All" Ordinal="72" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: Security).   The supported version that is affected is 8.52. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data as well as  read access to a subset of PeopleSoft PeopleTools accessible data.  CVSS Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0391</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.5</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="73" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0392</Title>
      <Notes>
         <Note Audience="All" Ordinal="73" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: Portal).  Supported versions that are affected are 8.51 and  8.52. Difficult to exploit vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data.  CVSS Base Score 4.3 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0392</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.3</BaseScore>
            <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="74" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0393</Title>
      <Notes>
         <Note Audience="All" Ordinal="74" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).  Supported versions that are affected are 8.3.7 and  8.4. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.   Note: Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8. CVSS Base Score 2.1 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0393</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.3.7</ProductID>
            <ProductID>P-2276V-8.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.1</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-2276V-8.3.7</ProductID>
            <ProductID>P-2276V-8.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="75" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0394</Title>
      <Notes>
         <Note Audience="All" Ordinal="75" Title="Details" Type="Details">Vulnerability in the PeopleSoft HRMS component of Oracle PeopleSoft Products (subcomponent: Candidate Gateway).  Supported versions that are affected are 9.0 and  9.1. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of PeopleSoft HRMS accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0394</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5043V-9.0</ProductID>
            <ProductID>P-5043V-9.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5043V-9.0</ProductID>
            <ProductID>P-5043V-9.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="76" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0395</Title>
      <Notes>
         <Note Audience="All" Ordinal="76" Title="Details" Type="Details">Vulnerability in the PeopleSoft PeopleTools component of Oracle PeopleSoft Products (subcomponent: Security).  Supported versions that are affected are 8.51 and  8.52. Easily exploitable vulnerability allows successful authenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some PeopleSoft PeopleTools accessible data.  CVSS Base Score 4.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0395</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.0</BaseScore>
            <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-5085V-8.51</ProductID>
            <ProductID>P-5085V-8.52</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="77" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0396</Title>
      <Notes>
         <Note Audience="All" Ordinal="77" Title="Details" Type="Details">Vulnerability in the APM - Application Performance Management component of Oracle Enterprise Manager Grid Control (subcomponent: Business Transaction Management).  Supported versions that are affected are 6.5, 11.1 and  12.1.0.2. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to all APM - Application Performance Management accessible data.  CVSS Base Score 5.0 (Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:N/I:P+/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0396</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9572V-6.5</ProductID>
            <ProductID>P-9572V-11.1</ProductID>
            <ProductID>P-9572V-12.1.0.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-9572V-6.5</ProductID>
            <ProductID>P-9572V-11.1</ProductID>
            <ProductID>P-9572V-12.1.0.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="78" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0397</Title>
      <Notes>
         <Note Audience="All" Ordinal="78" Title="Details" Type="Details">Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: Diagnostics).  Supported versions that are affected are 11.5.10.2, 12.0.6 and  12.1.3. Easily exploitable vulnerability allows successful unauthenticated network attacks via HTTP.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Oracle Applications Framework accessible data as well as  read access to a subset of Oracle Applications Framework accessible data.  CVSS Base Score 6.4 (Confidentiality and Integrity impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0397</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1472V-11.5.10.2</ProductID>
            <ProductID>P-1472V-12.0.6</ProductID>
            <ProductID>P-1472V-12.1.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.4</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-1472V-11.5.10.2</ProductID>
            <ProductID>P-1472V-12.0.6</ProductID>
            <ProductID>P-1472V-12.1.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="79" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0399</Title>
      <Notes>
         <Note Audience="All" Ordinal="79" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Utility/Umount).  Supported versions that are affected are 9 and  10. Difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution.  CVSS Base Score 6.6 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:S/C:C/I:C/A:C).  Oracle Vector: (AV:L/AC:M/Au:S/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0399</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-9</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.6</BaseScore>
            <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10006V-9</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="80" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0400</Title>
      <Notes>
         <Note Audience="All" Ordinal="80" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Filesystem/Cachefs).  Supported versions that are affected are 9 and  10. Difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution.  CVSS Base Score 6.6 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:S/C:C/I:C/A:C).  Oracle Vector: (AV:L/AC:M/Au:S/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0400</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-9</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.6</BaseScore>
            <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10006V-9</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="81" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0400</Title>
      <Notes>
         <Note Audience="All" Ordinal="81" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Filesystem/cachefs).  Supported versions that are affected are 9 and  10. Difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution.  CVSS Base Score 6.6 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:S/C:C/I:C/A:C).  Oracle Vector: (AV:L/AC:M/Au:S/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0400</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-9</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.6</BaseScore>
            <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10006V-9</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="82" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0407</Title>
      <Notes>
         <Note Audience="All" Ordinal="82" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Kernel/DTrace Framework).  Supported versions that are affected are 10 and  11. Easily exploitable vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System hang or frequently repeatable crash (complete DOS).  CVSS Base Score 4.6 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:S/C:N/I:N/A:C).  Oracle Vector: (AV:L/AC:L/Au:S/C:N/I:N/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0407</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>4.6</BaseScore>
            <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10006V-10</ProductID>
            <ProductID>P-10006V-11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="83" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0414</Title>
      <Notes>
         <Note Audience="All" Ordinal="83" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Utility/ksh93).   The supported version that is affected is 11. Difficult to exploit vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized  update, insert or delete access to some Solaris accessible data and ability to cause a partial denial of service (partial DOS) of Solaris.  CVSS Base Score 3.3 (Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:M/Au:N/C:N/I:P/A:P).  Oracle Vector: (AV:L/AC:M/Au:N/C:N/I:P/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0414</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>3.3</BaseScore>
            <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10006V-11</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="84" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0415</Title>
      <Notes>
         <Note Audience="All" Ordinal="84" Title="Details" Type="Details">Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Bind/Postinstall script for Bind package).   The supported version that is affected is 10. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution.  CVSS Base Score 6.0 (Confidentiality, Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:S/C:C/I:C/A:C).  Oracle Vector: (AV:L/AC:H/Au:S/C:C/I:C/A:C).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0415</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>6.0</BaseScore>
            <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="85" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0417</Title>
      <Notes>
         <Note Audience="All" Ordinal="85" Title="Details" Type="Details">Vulnerability in the Sun Storage Common Array Manager (CAM) component of Oracle Sun Products Suite (subcomponent: Fault Management System (FMS)).   The supported version that is affected is 6.9.0. Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols.  Successful attack of this vulnerability can result in unauthorized  read access to a subset of Sun Storage Common Array Manager (CAM) accessible data.  CVSS Base Score 5.0 (Confidentiality impacts).  CVSS V2 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).  Oracle Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0417</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10024V-6.9.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>5.0</BaseScore>
            <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-10024V-6.9.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="86" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0418</Title>
      <Notes>
         <Note Audience="All" Ordinal="86" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters).  Supported versions that are affected are 8.3.7 and  8.4. Easily exploitable vulnerability requiring logon to Operating System.  Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.   Note: Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8. CVSS Base Score 2.1 (Availability impacts).  CVSS V2 Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P).  Oracle Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:P).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0418</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.3.7</ProductID>
            <ProductID>P-2276V-8.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.1</BaseScore>
            <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-2276V-8.3.7</ProductID>
            <ProductID>P-2276V-8.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="87" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2013-0420</Title>
      <Notes>
         <Note Audience="All" Ordinal="87" Title="Details" Type="Details">Vulnerability in the VirtualBox component of Oracle Virtualization (subcomponent: Core).  Supported versions that are affected are 4.0, 4.1 and  4.2. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent.  Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of VirtualBox as well as  update, insert or delete access to some VirtualBox accessible data.  CVSS Base Score 2.4 (Integrity and Availability impacts).  CVSS V2 Vector: (AV:L/AC:H/Au:S/C:N/I:P/A:P).  Oracle Vector: (AV:L/AC:H/Au:S/C:N/I:P/A:P+).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2013-0420</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-4.0</ProductID>
            <ProductID>P-8370V-4.1</ProductID>
            <ProductID>P-8370V-4.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>2.4</BaseScore>
            <Vector>AV:L/AC:H/Au:S/C:N/I:P/A:P</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CPUJan2013</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html</URL>
            <ProductID>P-8370V-4.0</ProductID>
            <ProductID>P-8370V-4.1</ProductID>
            <ProductID>P-8370V-4.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
</cvrf:cvrfdoc>
