<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="2967710.xsl"?>
<?xml-stylesheet type="text/css" href="2967708.css"?>
<cvrf:cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
   <DocumentTitle xml:lang="en">Oracle Critical Patch Update Advisory - July 2019 - Oracle CVRF</DocumentTitle>
   <DocumentType xml:lang="en">Oracle Critical Patch Update Advisory</DocumentType>
   <DocumentPublisher Type="Vendor"/>
   <DocumentTracking>
      <Identification>
         <ID>CPUJul2019</ID>
      </Identification>
      <Status>Final</Status>
      <Version>2</Version>
      <RevisionHistory>
         <Revision>
            <Number>2</Number>
            <Date>2019-07-17T12:03:00-07:00</Date>
            <Description>Updated affected versions for CVE-2019-2856.</Description>
         </Revision>
      </RevisionHistory>
      <InitialReleaseDate>2019-07-16T13:00:00-07:00</InitialReleaseDate>
      <CurrentReleaseDate>2019-07-17T12:03:00-07:00</CurrentReleaseDate>
   </DocumentTracking>
   <DocumentNotes>
      <Note Audience="All" Ordinal="1" Title="Summary" Type="Summary" xml:lang="en">This document contains descriptions of Oracle product security vulnerabilities which have had security patches released for all supported versions and platforms for the associated product.  Additional information regarding these vulnerabilities including security patch distribution information can be found at the Oracle sites referenced in this document.</Note>
   </DocumentNotes>
   <DocumentDistribution>This document is published at: https://www.oracle.com/a/tech/docs/5572395.xml</DocumentDistribution>
   <DocumentReferences>
      <Reference Type="External">
         <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
         <Description>URL to html version of Advisory</Description>
      </Reference>
   </DocumentReferences>
   <Acknowledgments>
      <Acknowledgment>
         <Name>162187647</Name>
         <Organization>162187647</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Narendra Singh</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Abbas Mamoun</Name>
         <Organization>Abbas Mamoun</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Abid Gul Shahid</Name>
         <Organization>Abid Gul Shahid</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Alexander Kornbrust</Name>
         <Organization>Red Database Security</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Andrej Simko</Name>
         <Organization>Accenture</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Andrej Simko of Accenture working with iDefense Labs</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Andres Georgieff</Name>
         <Organization>Sandia National Laboratories</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Andrzej Dyjak</Name>
         <Organization>sigsegv.pl</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Anonymous researcher working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Anthony Laou Hine Tsuei working with Trend Micro Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Bartlomiej Bergier</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Bibek Shah</Name>
         <Organization>Bibek Shah</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Brian Healy</Name>
         <Organization>Sandia National Laboratories</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Cornelius Aschermann</Name>
         <Organization>Ruhr-University Bochum</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Dasari Narendra</Name>
         <Organization>Dasari Narendra</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Devin Rosenbauer</Name>
         <Organization>Identity Works LLC</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ephem</Name>
         <Organization>Ephem</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Fabio Pires</Name>
         <Organization>NCC Group</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Gaston Traberg</Name>
         <Organization>Onapsis</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>George R</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Giuseppino Cadeddu</Name>
         <Organization>Quantum Leap</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Hanno Böck</Name>
         <Organization>Hanno Böck</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Harold Fang</Name>
         <Organization>Harold Fang</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jan Kopriva</Name>
         <Organization>Alef Nula</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jason Matthyser of MWR Labs working with Trend Micro Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jayson Grace</Name>
         <Organization>Sandia National Laboratories</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jonathan Birch</Name>
         <Organization>Microsoft Corp.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Jonathan Leitschuh</Name>
         <Organization>Jonathan Leitschuh</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Juraj Somorovsky</Name>
         <Organization>Ruhr-University Bochum</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Kamlapati Choubey of Trend Micro working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Keegan Ryan</Name>
         <Organization>NCC Group</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lionel Debroux</Name>
         <Organization>Lionel Debroux</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Luca Moro of Synacktiv</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lucas Dinucci</Name>
         <Organization>Lucas Dinucci</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lukasz Mikula</Name>
         <Organization>LUKASZ MIKULA</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Manuel Rigger</Name>
         <Organization>Eth Zurich</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Marcin Wołoszyn</Name>
         <Organization>ING Services Polska</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Markus Wulftange of Code White GmbH</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Martin Doyhenard</Name>
         <Organization>Onapsis</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Mateusz Jurczyk of Google Project Zero</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Mathew Nash</Name>
         <Organization>NCC Group</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Matthias Kaiser of Apple Information Security</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Minle Chen</Name>
         <Organization>PingAn Galaxy Lab</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Mirza Burhan Baig</Name>
         <Organization>Dig8Labs</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Nati Nimni</Name>
         <Organization>Microsoft Corp.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Naveen Kumar</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Nimrod Aviram</Name>
         <Organization>Nimrod Aviram</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Or Hanuka</Name>
         <Organization>Motorola Solutions</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Patrick Samuel</Name>
         <Organization>Patrick Samuel</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Peter Dettman</Name>
         <Organization>cryptoworkshop.com</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Raju Mogulapalli of Rheem Manufacturing</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Robert Merget of Ruhr-University Bochum</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sarath Nair</Name>
         <Organization>Sarath Nair</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Sergej Schumilo</Name>
         <Organization>Ruhr-University Bochum</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Simon Worner</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Steven Seeley of Source Incite working with iDefense</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Suhas Nayak</Name>
         <Organization>Suhas Nayak</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Tilman Hausherr</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Tzachy Horesh</Name>
         <Organization>Motorola Solutions</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Ubais PK</Name>
         <Organization>Ubais PK</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Vahagn Vardanyan</Name>
         <Organization>Vahagn Vardanyan</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Vladimir Egorov</Name>
         <Organization>Vladimir Egorov</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Wai Yan Aung</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>William Bonnaventure</Name>
         <Organization>University of Luxembourg</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Huyna of Viettel Cyber Security working with Trend Micro Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>lofiboy of VinCSS (Vingroup) working with Trend Micro Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>rgod of 9sg Security Team working with Trend Micro's Zero Day Initiative</Name>
         <Organization></Organization>
      </Acknowledgment>
   </Acknowledgments>
   <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
      <Branch Name="Oracle" Type="Vendor">
         <Branch Name="Oracle Berkeley DB" Type="Product Family">
            <Branch Name="Berkeley DB" Type="Product Name">
               <Branch Name="12.1.6.1.23" Type="Product Version">
                  <FullProductName ProductID="P-2051V-12.1.6.1.23">Berkeley DB Version 12.1.6.1.23</FullProductName>
               </Branch>
               <Branch Name="12.1.6.1.26" Type="Product Version">
                  <FullProductName ProductID="P-2051V-12.1.6.1.26">Berkeley DB Version 12.1.6.1.26</FullProductName>
               </Branch>
               <Branch Name="12.1.6.1.29" Type="Product Version">
                  <FullProductName ProductID="P-2051V-12.1.6.1.29">Berkeley DB Version 12.1.6.1.29</FullProductName>
               </Branch>
               <Branch Name="12.1.6.1.36" Type="Product Version">
                  <FullProductName ProductID="P-2051V-12.1.6.1.36">Berkeley DB Version 12.1.6.1.36</FullProductName>
               </Branch>
               <Branch Name="12.1.6.2.23" Type="Product Version">
                  <FullProductName ProductID="P-2051V-12.1.6.2.23">Berkeley DB Version 12.1.6.2.23</FullProductName>
               </Branch>
               <Branch Name="12.1.6.2.32" Type="Product Version">
                  <FullProductName ProductID="P-2051V-12.1.6.2.32">Berkeley DB Version 12.1.6.2.32</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Communications" Type="Product Family">
            <Branch Name="Communications Converged Application Server" Type="Product Name">
               <Branch Name="5.1" Type="Product Version">
                  <FullProductName ProductID="P-5382V-5.1">Communications Converged Application Server Version 5.1</FullProductName>
               </Branch>
               <Branch Name="7.0" Type="Product Version">
                  <FullProductName ProductID="P-5382V-7.0">Communications Converged Application Server Version 7.0</FullProductName>
               </Branch>
               <Branch Name="7.1" Type="Product Version">
                  <FullProductName ProductID="P-5382V-7.1">Communications Converged Application Server Version 7.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Converged Application Server - Service Controller" Type="Product Name">
               <Branch Name="6.0" Type="Product Version">
                  <FullProductName ProductID="P-10593V-6.0">Communications Converged Application Server - Service Controller Version 6.0</FullProductName>
               </Branch>
               <Branch Name="6.1" Type="Product Version">
                  <FullProductName ProductID="P-10593V-6.1">Communications Converged Application Server - Service Controller Version 6.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Interactive Session Recorder" Type="Product Name">
               <Branch Name="6.0" Type="Product Version">
                  <FullProductName ProductID="P-10765V-6.0">Communications Interactive Session Recorder Version 6.0</FullProductName>
               </Branch>
               <Branch Name="6.1" Type="Product Version">
                  <FullProductName ProductID="P-10765V-6.1">Communications Interactive Session Recorder Version 6.1</FullProductName>
               </Branch>
               <Branch Name="6.2" Type="Product Version">
                  <FullProductName ProductID="P-10765V-6.2">Communications Interactive Session Recorder Version 6.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications EAGLE (Software)" Type="Product Name">
               <Branch Name="46.5" Type="Product Version">
                  <FullProductName ProductID="P-10768V-46.5">Communications EAGLE (Software) Version 46.5</FullProductName>
               </Branch>
               <Branch Name="46.6" Type="Product Version">
                  <FullProductName ProductID="P-10768V-46.6">Communications EAGLE (Software) Version 46.6</FullProductName>
               </Branch>
               <Branch Name="46.7" Type="Product Version">
                  <FullProductName ProductID="P-10768V-46.7">Communications EAGLE (Software) Version 46.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Application Session Controller" Type="Product Name">
               <Branch Name="3.7.1" Type="Product Version">
                  <FullProductName ProductID="P-10769V-3.7.1">Communications Application Session Controller Version 3.7.1</FullProductName>
               </Branch>
               <Branch Name="3.8.0" Type="Product Version">
                  <FullProductName ProductID="P-10769V-3.8.0">Communications Application Session Controller Version 3.8.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Communications Diameter Signaling Router (DSR)" Type="Product Name">
               <Branch Name="8.0" Type="Product Version">
                  <FullProductName ProductID="P-10899V-8.0">Communications Diameter Signaling Router (DSR) Version 8.0</FullProductName>
               </Branch>
               <Branch Name="8.1" Type="Product Version">
                  <FullProductName ProductID="P-10899V-8.1">Communications Diameter Signaling Router (DSR) Version 8.1</FullProductName>
               </Branch>
               <Branch Name="8.2" Type="Product Version">
                  <FullProductName ProductID="P-10899V-8.2">Communications Diameter Signaling Router (DSR) Version 8.2</FullProductName>
               </Branch>
               <Branch Name="8.3" Type="Product Version">
                  <FullProductName ProductID="P-10899V-8.3">Communications Diameter Signaling Router (DSR) Version 8.3</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Construction and Engineering" Type="Product Family">
            <Branch Name="Primavera Analytics" Type="Product Name">
               <Branch Name="18.8" Type="Product Version">
                  <FullProductName ProductID="P-8577V-18.8">Primavera Analytics Version 18.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Primavera Unifier" Type="Product Name">
               <Branch Name="16.1" Type="Product Version">
                  <FullProductName ProductID="P-10354V-16.1">Primavera Unifier Version 16.1</FullProductName>
               </Branch>
               <Branch Name="16.2" Type="Product Version">
                  <FullProductName ProductID="P-10354V-16.2">Primavera Unifier Version 16.2</FullProductName>
               </Branch>
               <Branch Name="17.7-17.12" Type="Product Version">
                  <FullProductName ProductID="P-10354V-17.7-17.12">Primavera Unifier Version 17.7-17.12</FullProductName>
               </Branch>
               <Branch Name="18.8" Type="Product Version">
                  <FullProductName ProductID="P-10354V-18.8">Primavera Unifier Version 18.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Instantis EnterpriseTrack" Type="Product Name">
               <Branch Name="17.1" Type="Product Version">
                  <FullProductName ProductID="P-10563V-17.1">Instantis EnterpriseTrack Version 17.1</FullProductName>
               </Branch>
               <Branch Name="17.2" Type="Product Version">
                  <FullProductName ProductID="P-10563V-17.2">Instantis EnterpriseTrack Version 17.2</FullProductName>
               </Branch>
               <Branch Name="17.3" Type="Product Version">
                  <FullProductName ProductID="P-10563V-17.3">Instantis EnterpriseTrack Version 17.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Primavera Gateway" Type="Product Name">
               <Branch Name="15.2" Type="Product Version">
                  <FullProductName ProductID="P-10605V-15.2">Primavera Gateway Version 15.2</FullProductName>
               </Branch>
               <Branch Name="16.2" Type="Product Version">
                  <FullProductName ProductID="P-10605V-16.2">Primavera Gateway Version 16.2</FullProductName>
               </Branch>
               <Branch Name="17.12" Type="Product Version">
                  <FullProductName ProductID="P-10605V-17.12">Primavera Gateway Version 17.12</FullProductName>
               </Branch>
               <Branch Name="18.8" Type="Product Version">
                  <FullProductName ProductID="P-10605V-18.8">Primavera Gateway Version 18.8</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Database Server" Type="Product Family">
            <Branch Name="Database - Enterprise Edition" Type="Product Name">
               <Branch Name="11.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-5V-11.2.0.4">Database - Enterprise Edition Version 11.2.0.4</FullProductName>
               </Branch>
               <Branch Name="12.1.0.2" Type="Product Version">
                  <FullProductName ProductID="P-5V-12.1.0.2">Database - Enterprise Edition Version 12.1.0.2</FullProductName>
               </Branch>
               <Branch Name="12.2.0.1" Type="Product Version">
                  <FullProductName ProductID="P-5V-12.2.0.1">Database - Enterprise Edition Version 12.2.0.1</FullProductName>
               </Branch>
               <Branch Name="18c" Type="Product Version">
                  <FullProductName ProductID="P-5V-18c">Database - Enterprise Edition Version 18c</FullProductName>
               </Branch>
               <Branch Name="19c" Type="Product Version">
                  <FullProductName ProductID="P-5V-19c">Database - Enterprise Edition Version 19c</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Text" Type="Product Name">
               <Branch Name="11.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-211V-11.2.0.4">Text Version 11.2.0.4</FullProductName>
               </Branch>
               <Branch Name="12.1.0.2" Type="Product Version">
                  <FullProductName ProductID="P-211V-12.1.0.2">Text Version 12.1.0.2</FullProductName>
               </Branch>
               <Branch Name="12.2.0.1" Type="Product Version">
                  <FullProductName ProductID="P-211V-12.2.0.1">Text Version 12.2.0.1</FullProductName>
               </Branch>
               <Branch Name="18c" Type="Product Version">
                  <FullProductName ProductID="P-211V-18c">Text Version 18c</FullProductName>
               </Branch>
               <Branch Name="19c" Type="Product Version">
                  <FullProductName ProductID="P-211V-19c">Text Version 19c</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="ODBC Driver" Type="Product Name">
               <Branch Name="11.2.0.4" Type="Product Version">
                  <FullProductName ProductID="P-579V-11.2.0.4">ODBC Driver Version 11.2.0.4</FullProductName>
               </Branch>
               <Branch Name="12.1.0.2" Type="Product Version">
                  <FullProductName ProductID="P-579V-12.1.0.2">ODBC Driver Version 12.1.0.2</FullProductName>
               </Branch>
               <Branch Name="12.2.0.1" Type="Product Version">
                  <FullProductName ProductID="P-579V-12.2.0.1">ODBC Driver Version 12.2.0.1</FullProductName>
               </Branch>
               <Branch Name="18c" Type="Product Version">
                  <FullProductName ProductID="P-579V-18c">ODBC Driver Version 18c</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Spatial and Graph" Type="Product Name">
               <Branch Name="12.2.0.1" Type="Product Version">
                  <FullProductName ProductID="P-619V-12.2.0.1">Spatial and Graph Version 12.2.0.1</FullProductName>
               </Branch>
               <Branch Name="18c" Type="Product Version">
                  <FullProductName ProductID="P-619V-18c">Spatial and Graph Version 18c</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Application Express (APEX)" Type="Product Name">
               <Branch Name="18.2" Type="Product Version">
                  <FullProductName ProductID="P-1348V-18.2">Application Express (APEX) Version 18.2</FullProductName>
               </Branch>
               <Branch Name="5.1" Type="Product Version">
                  <FullProductName ProductID="P-1348V-5.1">Application Express (APEX) Version 5.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle E-Business Suite" Type="Product Family">
            <Branch Name="Applications Manager" Type="Product Name">
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-99V-12.1.3">Applications Manager Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3 - 12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-99V-12.2.3 - 12.2.8">Applications Manager Version 12.2.3 - 12.2.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Payments" Type="Product Name">
               <Branch Name="12.1.1 - 12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-378V-12.1.1 - 12.1.3">Payments Version 12.1.1 - 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3 - 12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-378V-12.2.3 - 12.2.8">Payments Version 12.2.3 - 12.2.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="iSupport" Type="Product Name">
               <Branch Name="12.1.1 - 12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-381V-12.1.1 - 12.1.3">iSupport Version 12.1.1 - 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3 - 12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-381V-12.2.3 - 12.2.8">iSupport Version 12.2.3 - 12.2.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Application Object Library" Type="Product Name">
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.1.3">Application Object Library Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3 - 12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-510V-12.2.3 - 12.2.8">Application Object Library Version 12.2.3 - 12.2.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Field Service" Type="Product Name">
               <Branch Name="12.1.1 - 12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-747V-12.1.1 - 12.1.3">Field Service Version 12.1.1 - 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3 - 12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-747V-12.2.3 - 12.2.8">Field Service Version 12.2.3 - 12.2.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="iRecruitment" Type="Product Name">
               <Branch Name="12.1.1 - 12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1193V-12.1.1 - 12.1.3">iRecruitment Version 12.1.1 - 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3 - 12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-1193V-12.2.3 - 12.2.8">iRecruitment Version 12.2.3 - 12.2.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="CRM Technical Foundation" Type="Product Name">
               <Branch Name="12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.1.3">CRM Technical Foundation Version 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3 - 12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-1199V-12.2.3 - 12.2.8">CRM Technical Foundation Version 12.2.3 - 12.2.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="One-to-One Fulfillment" Type="Product Name">
               <Branch Name="12.1.1 - 12.1.3" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.1.1 - 12.1.3">One-to-One Fulfillment Version 12.1.1 - 12.1.3</FullProductName>
               </Branch>
               <Branch Name="12.2.3 - 12.2.8" Type="Product Version">
                  <FullProductName ProductID="P-1379V-12.2.3 - 12.2.8">One-to-One Fulfillment Version 12.2.3 - 12.2.8</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Enterprise Manager" Type="Product Family">
            <Branch Name="Enterprise Manager for Fusion Middleware" Type="Product Name">
               <Branch Name="13.2" Type="Product Version">
                  <FullProductName ProductID="P-1369V-13.2">Enterprise Manager for Fusion Middleware Version 13.2</FullProductName>
               </Branch>
               <Branch Name="13.3" Type="Product Version">
                  <FullProductName ProductID="P-1369V-13.3">Enterprise Manager for Fusion Middleware Version 13.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager Base Platform" Type="Product Name">
               <Branch Name="12.1.0.5.0" Type="Product Version">
                  <FullProductName ProductID="P-1370V-12.1.0.5.0">Enterprise Manager Base Platform Version 12.1.0.5.0</FullProductName>
               </Branch>
               <Branch Name="13.2.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-1370V-13.2.0.0.0">Enterprise Manager Base Platform Version 13.2.0.0.0</FullProductName>
               </Branch>
               <Branch Name="13.3.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-1370V-13.3.0.0.0">Enterprise Manager Base Platform Version 13.3.0.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Application Testing Suite" Type="Product Name">
               <Branch Name="13.1" Type="Product Version">
                  <FullProductName ProductID="P-4622V-13.1">Application Testing Suite Version 13.1</FullProductName>
               </Branch>
               <Branch Name="13.2" Type="Product Version">
                  <FullProductName ProductID="P-4622V-13.2">Application Testing Suite Version 13.2</FullProductName>
               </Branch>
               <Branch Name="13.3" Type="Product Version">
                  <FullProductName ProductID="P-4622V-13.3">Application Testing Suite Version 13.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager for Virtualization" Type="Product Name">
               <Branch Name="13.1" Type="Product Version">
                  <FullProductName ProductID="P-9586V-13.1">Enterprise Manager for Virtualization Version 13.1</FullProductName>
               </Branch>
               <Branch Name="13.2" Type="Product Version">
                  <FullProductName ProductID="P-9586V-13.2">Enterprise Manager for Virtualization Version 13.2</FullProductName>
               </Branch>
               <Branch Name="13.3" Type="Product Version">
                  <FullProductName ProductID="P-9586V-13.3">Enterprise Manager for Virtualization Version 13.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Manager Ops Center" Type="Product Name">
               <Branch Name="12.3.3" Type="Product Version">
                  <FullProductName ProductID="P-9835V-12.3.3">Enterprise Manager Ops Center Version 12.3.3</FullProductName>
               </Branch>
               <Branch Name="12.4.0" Type="Product Version">
                  <FullProductName ProductID="P-9835V-12.4.0">Enterprise Manager Ops Center Version 12.4.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Financial Services Applications" Type="Product Family">
            <Branch Name="Financial Services Revenue Management and Billing" Type="Product Name">
               <Branch Name="2.4.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.4.0.0">Financial Services Revenue Management and Billing Version 2.4.0.0</FullProductName>
               </Branch>
               <Branch Name="2.4.0.1" Type="Product Version">
                  <FullProductName ProductID="P-5322V-2.4.0.1">Financial Services Revenue Management and Billing Version 2.4.0.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Profitability Management" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-5658V-8.0.4-8.0.7">Financial Services Profitability Management Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Funds Transfer Pricing" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-5659V-8.0.4-8.0.7">Financial Services Funds Transfer Pricing Version 8.0.4-8.0.7</FullProductName>
               </Branch>
               <Branch Name="8.0.6-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-5659V-8.0.6-8.0.7">Financial Services Funds Transfer Pricing Version 8.0.6-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Asset Liability Management" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-5662V-8.0.4-8.0.7">Financial Services Asset Liability Management Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Analytical Applications Infrastructure" Type="Product Name">
               <Branch Name="7.3.3-7.3.5" Type="Product Version">
                  <FullProductName ProductID="P-5680V-7.3.3-7.3.5">Financial Services Analytical Applications Infrastructure Version 7.3.3-7.3.5</FullProductName>
               </Branch>
               <Branch Name="8.0.2-8.0.8" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.0.2-8.0.8">Financial Services Analytical Applications Infrastructure Version 8.0.2-8.0.8</FullProductName>
               </Branch>
               <Branch Name="8.0.5-8.0.8" Type="Product Version">
                  <FullProductName ProductID="P-5680V-8.0.5-8.0.8">Financial Services Analytical Applications Infrastructure Version 8.0.5-8.0.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Analytical Applications Reconciliation Framework" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-5748V-8.0.4-8.0.7">Financial Services Analytical Applications Reconciliation Framework Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Price Creation and Discovery" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-5749V-8.0.4-8.0.7">Financial Services Price Creation and Discovery Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FLEXCUBE Universal Banking" Type="Product Name">
               <Branch Name="12.0.1-12.0.3" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.0.1-12.0.3">FLEXCUBE Universal Banking Version 12.0.1-12.0.3</FullProductName>
               </Branch>
               <Branch Name="12.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.1.0">FLEXCUBE Universal Banking Version 12.1.0</FullProductName>
               </Branch>
               <Branch Name="12.1.0-12.4.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-12.1.0-12.4.0">FLEXCUBE Universal Banking Version 12.1.0-12.4.0</FullProductName>
               </Branch>
               <Branch Name="14.0.0-14.2.0" Type="Product Version">
                  <FullProductName ProductID="P-9052V-14.0.0-14.2.0">FLEXCUBE Universal Banking Version 14.0.0-14.2.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Liquidity Risk Management" Type="Product Name">
               <Branch Name="8.0.1" Type="Product Version">
                  <FullProductName ProductID="P-9096V-8.0.1">Financial Services Liquidity Risk Management Version 8.0.1</FullProductName>
               </Branch>
               <Branch Name="8.0.2" Type="Product Version">
                  <FullProductName ProductID="P-9096V-8.0.2">Financial Services Liquidity Risk Management Version 8.0.2</FullProductName>
               </Branch>
               <Branch Name="8.0.4" Type="Product Version">
                  <FullProductName ProductID="P-9096V-8.0.4">Financial Services Liquidity Risk Management Version 8.0.4</FullProductName>
               </Branch>
               <Branch Name="8.0.5" Type="Product Version">
                  <FullProductName ProductID="P-9096V-8.0.5">Financial Services Liquidity Risk Management Version 8.0.5</FullProductName>
               </Branch>
               <Branch Name="8.0.6" Type="Product Version">
                  <FullProductName ProductID="P-9096V-8.0.6">Financial Services Liquidity Risk Management Version 8.0.6</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FLEXCUBE Investor Servicing" Type="Product Name">
               <Branch Name="12.0.1" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.0.1">FLEXCUBE Investor Servicing Version 12.0.1</FullProductName>
               </Branch>
               <Branch Name="12.0.3" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.0.3">FLEXCUBE Investor Servicing Version 12.0.3</FullProductName>
               </Branch>
               <Branch Name="12.0.4" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.0.4">FLEXCUBE Investor Servicing Version 12.0.4</FullProductName>
               </Branch>
               <Branch Name="12.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.1.0">FLEXCUBE Investor Servicing Version 12.1.0</FullProductName>
               </Branch>
               <Branch Name="12.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.3.0">FLEXCUBE Investor Servicing Version 12.3.0</FullProductName>
               </Branch>
               <Branch Name="12.4.0" Type="Product Version">
                  <FullProductName ProductID="P-9099V-12.4.0">FLEXCUBE Investor Servicing Version 12.4.0</FullProductName>
               </Branch>
               <Branch Name="14.0.0" Type="Product Version">
                  <FullProductName ProductID="P-9099V-14.0.0">FLEXCUBE Investor Servicing Version 14.0.0</FullProductName>
               </Branch>
               <Branch Name="14.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9099V-14.1.0">FLEXCUBE Investor Servicing Version 14.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FLEXCUBE Enterprise Limits and Collateral Management" Type="Product Name">
               <Branch Name="12.0" Type="Product Version">
                  <FullProductName ProductID="P-9100V-12.0">FLEXCUBE Enterprise Limits and Collateral Management Version 12.0</FullProductName>
               </Branch>
               <Branch Name="12.1" Type="Product Version">
                  <FullProductName ProductID="P-9100V-12.1">FLEXCUBE Enterprise Limits and Collateral Management Version 12.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FLEXCUBE Core Banking" Type="Product Name">
               <Branch Name="11.6.0" Type="Product Version">
                  <FullProductName ProductID="P-9101V-11.6.0">FLEXCUBE Core Banking Version 11.6.0</FullProductName>
               </Branch>
               <Branch Name="11.7.0" Type="Product Version">
                  <FullProductName ProductID="P-9101V-11.7.0">FLEXCUBE Core Banking Version 11.7.0</FullProductName>
               </Branch>
               <Branch Name="11.8.0" Type="Product Version">
                  <FullProductName ProductID="P-9101V-11.8.0">FLEXCUBE Core Banking Version 11.8.0</FullProductName>
               </Branch>
               <Branch Name="5.2.0" Type="Product Version">
                  <FullProductName ProductID="P-9101V-5.2.0">FLEXCUBE Core Banking Version 5.2.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="FLEXCUBE Private Banking" Type="Product Name">
               <Branch Name="12.0.1" Type="Product Version">
                  <FullProductName ProductID="P-9110V-12.0.1">FLEXCUBE Private Banking Version 12.0.1</FullProductName>
               </Branch>
               <Branch Name="12.0.3" Type="Product Version">
                  <FullProductName ProductID="P-9110V-12.0.3">FLEXCUBE Private Banking Version 12.0.3</FullProductName>
               </Branch>
               <Branch Name="12.1.0" Type="Product Version">
                  <FullProductName ProductID="P-9110V-12.1.0">FLEXCUBE Private Banking Version 12.1.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Banking Platform" Type="Product Name">
               <Branch Name="2.4.0-2.7.1" Type="Product Version">
                  <FullProductName ProductID="P-9178V-2.4.0-2.7.1">Banking Platform Version 2.4.0-2.7.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Data Foundation" Type="Product Name">
               <Branch Name="8.0.4-8.0.8" Type="Product Version">
                  <FullProductName ProductID="P-9180V-8.0.4-8.0.8">Financial Services Data Foundation Version 8.0.4-8.0.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Hedge Management and IFRS Valuations" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-9332V-8.0.4-8.0.7">Financial Services Hedge Management and IFRS Valuations Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Basel Regulatory Capital Internal Ratings Based Approach" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-9450V-8.0.4-8.0.7">Financial Services Basel Regulatory Capital Internal Ratings Based Approach Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Loan Loss Forecasting and Provisioning" Type="Product Name">
               <Branch Name="8.0.2-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-9474V-8.0.2-8.0.7">Financial Services Loan Loss Forecasting and Provisioning Version 8.0.2-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Basel Regulatory Capital Basic" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-9612V-8.0.4-8.0.7">Financial Services Basel Regulatory Capital Basic Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Insurance Data Foundation" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-9755V-8.0.4-8.0.7">Insurance Data Foundation Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Retail Customer Analytics" Type="Product Name">
               <Branch Name="8.0.4-8.0.6" Type="Product Version">
                  <FullProductName ProductID="P-10214V-8.0.4-8.0.6">Financial Services Retail Customer Analytics Version 8.0.4-8.0.6</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Institutional Performance Analytics" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-10215V-8.0.4-8.0.7">Financial Services Institutional Performance Analytics Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Insurance Performance Insight" Type="Product Name">
               <Branch Name="8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-11257V-8.0.7">Insurance Performance Insight Version 8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Data Integration Hub" Type="Product Name">
               <Branch Name="8.0.5-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-11289V-8.0.5-8.0.7">Financial Services Data Integration Hub Version 8.0.5-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services - Regulatory Reporting for Reserve Bank of India - Lombard Risk Integration Pack" Type="Product Name">
               <Branch Name="8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-12586V-8.0.7">Financial Services - Regulatory Reporting for Reserve Bank of India - Lombard Risk Integration Pack Version 8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services - Regulatory Reporting for US Federal Reserve - Lombard Risk Integration Pack" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-12587V-8.0.4-8.0.7">Financial Services - Regulatory Reporting for US Federal Reserve - Lombard Risk Integration Pack Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Regulatory Reporting for US Federal Reserve" Type="Product Name">
               <Branch Name="8.0.4-8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-13080V-8.0.4-8.0.7">Financial Services Regulatory Reporting for US Federal Reserve Version 8.0.4-8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Market Risk Measurement and Management" Type="Product Name">
               <Branch Name="8.0.5" Type="Product Version">
                  <FullProductName ProductID="P-13111V-8.0.5">Financial Services Market Risk Measurement and Management Version 8.0.5</FullProductName>
               </Branch>
               <Branch Name="8.0.6" Type="Product Version">
                  <FullProductName ProductID="P-13111V-8.0.6">Financial Services Market Risk Measurement and Management Version 8.0.6</FullProductName>
               </Branch>
               <Branch Name="8.0.8" Type="Product Version">
                  <FullProductName ProductID="P-13111V-8.0.8">Financial Services Market Risk Measurement and Management Version 8.0.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Regulatory Reporting for European Banking Authority" Type="Product Name">
               <Branch Name="8.0.6" Type="Product Version">
                  <FullProductName ProductID="P-13147V-8.0.6">Financial Services Regulatory Reporting for European Banking Authority Version 8.0.6</FullProductName>
               </Branch>
               <Branch Name="8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-13147V-8.0.7">Financial Services Regulatory Reporting for European Banking Authority Version 8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Regulatory Reporting for European Banking Authority - Integration Pack for Lombard Risk" Type="Product Name">
               <Branch Name="8.0.6" Type="Product Version">
                  <FullProductName ProductID="P-13148V-8.0.6">Financial Services Regulatory Reporting for European Banking Authority - Integration Pack for Lombard Risk Version 8.0.6</FullProductName>
               </Branch>
               <Branch Name="8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-13148V-8.0.7">Financial Services Regulatory Reporting for European Banking Authority - Integration Pack for Lombard Risk Version 8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Financial Services Liquidity Risk Measurement and Management" Type="Product Name">
               <Branch Name="8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-13797V-8.0.7">Financial Services Liquidity Risk Measurement and Management Version 8.0.7</FullProductName>
               </Branch>
               <Branch Name="8.0.8" Type="Product Version">
                  <FullProductName ProductID="P-13797V-8.0.8">Financial Services Liquidity Risk Measurement and Management Version 8.0.8</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Insurance Accounting Analyzer" Type="Product Name">
               <Branch Name="8.0.6" Type="Product Version">
                  <FullProductName ProductID="P-13809V-8.0.6">Insurance Accounting Analyzer Version 8.0.6</FullProductName>
               </Branch>
               <Branch Name="8.0.7" Type="Product Version">
                  <FullProductName ProductID="P-13809V-8.0.7">Insurance Accounting Analyzer Version 8.0.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Insurance Allocation Manager for Enterprise Profitability" Type="Product Name">
               <Branch Name="8.0.8" Type="Product Version">
                  <FullProductName ProductID="P-13946V-8.0.8">Insurance Allocation Manager for Enterprise Profitability Version 8.0.8</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Food and Beverage Applications" Type="Product Family">
            <Branch Name="Hospitality Simphony" Type="Product Name">
               <Branch Name="18.2.1" Type="Product Version">
                  <FullProductName ProductID="P-11594V-18.2.1">Hospitality Simphony Version 18.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Hospitality Gift and Loyalty" Type="Product Name">
               <Branch Name="9.0.0" Type="Product Version">
                  <FullProductName ProductID="P-11600V-9.0.0">Hospitality Gift and Loyalty Version 9.0.0</FullProductName>
               </Branch>
               <Branch Name="9.1.0" Type="Product Version">
                  <FullProductName ProductID="P-11600V-9.1.0">Hospitality Gift and Loyalty Version 9.1.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Fusion Middleware" Type="Product Family">
            <Branch Name="Security Service" Type="Product Name">
               <Branch Name="11.1.1.9.0" Type="Product Version">
                  <FullProductName ProductID="P-991V-11.1.1.9.0">Security Service Version 11.1.1.9.0</FullProductName>
               </Branch>
               <Branch Name="12.1.3.0.0" Type="Product Version">
                  <FullProductName ProductID="P-991V-12.1.3.0.0">Security Service Version 12.1.3.0.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-991V-12.2.1.3.0">Security Service Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="HTTP Server" Type="Product Name">
               <Branch Name="12.1.3.0.0" Type="Product Version">
                  <FullProductName ProductID="P-1042V-12.1.3.0.0">HTTP Server Version 12.1.3.0.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1042V-12.2.1.3.0">HTTP Server Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="SOA Suite" Type="Product Name">
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1162V-12.2.1.3.0">SOA Suite Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="BI Publisher (formerly XML Publisher)" Type="Product Name">
               <Branch Name="11.1.1.9.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-11.1.1.9.0">BI Publisher (formerly XML Publisher) Version 11.1.1.9.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-12.2.1.3.0">BI Publisher (formerly XML Publisher) Version 12.2.1.3.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-1479V-12.2.1.4.0">BI Publisher (formerly XML Publisher) Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Identity Manager" Type="Product Name">
               <Branch Name="11.1.2.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1980V-11.1.2.3.0">Identity Manager Version 11.1.2.3.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-1980V-12.2.1.3.0">Identity Manager Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Business Intelligence Enterprise Edition" Type="Product Name">
               <Branch Name="11.1.1.9.0" Type="Product Version">
                  <FullProductName ProductID="P-2025V-11.1.1.9.0">Business Intelligence Enterprise Edition Version 11.1.1.9.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.4.0" Type="Product Version">
                  <FullProductName ProductID="P-2025V-12.2.1.4.0">Business Intelligence Enterprise Edition Version 12.2.1.4.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Data Integrator" Type="Product Name">
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-2196V-12.2.1.3.0">Data Integrator Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Outside In Technology" Type="Product Name">
               <Branch Name="8.5.4" Type="Product Version">
                  <FullProductName ProductID="P-2276V-8.5.4">Outside In Technology Version 8.5.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="WebLogic Server" Type="Product Name">
               <Branch Name="10.3.6.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-10.3.6.0.0">WebLogic Server Version 10.3.6.0.0</FullProductName>
               </Branch>
               <Branch Name="12.1.3.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.1.3.0.0">WebLogic Server Version 12.1.3.0.0</FullProductName>
               </Branch>
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.2.1.3.0">WebLogic Server Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Enterprise Repository" Type="Product Name">
               <Branch Name="12.1.3.0.0" Type="Product Version">
                  <FullProductName ProductID="P-5326V-12.1.3.0.0">Enterprise Repository Version 12.1.3.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="WebCenter Sites" Type="Product Name">
               <Branch Name="12.2.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-9617V-12.2.1.3.0">WebCenter Sites Version 12.2.1.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Endeca Server" Type="Product Name">
               <Branch Name="7.7.0" Type="Product Version">
                  <FullProductName ProductID="P-10217V-7.7.0">Endeca Server Version 7.7.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Endeca Information Discovery Integrator" Type="Product Name">
               <Branch Name="3.2.0" Type="Product Version">
                  <FullProductName ProductID="P-10561V-3.2.0">Endeca Information Discovery Integrator Version 3.2.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Global Lifecycle Management" Type="Product Family">
            <Branch Name="Global Lifecycle Management OPatchAuto" Type="Product Name">
               <Branch Name="Prior to 12.2.0.1.14" Type="Product Version">
                  <FullProductName ProductID="P-12752V-Prior to 12.2.0.1.14">Global Lifecycle Management OPatchAuto Version Prior to 12.2.0.1.14</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle GraalVM" Type="Product Family">
            <Branch Name="GraalVM Enterprise Edition" Type="Product Name">
               <Branch Name="19.0.0" Type="Product Version">
                  <FullProductName ProductID="P-13497V-19.0.0">GraalVM Enterprise Edition Version 19.0.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Hospitality Applications" Type="Product Family">
            <Branch Name="Hospitality Guest Access" Type="Product Name">
               <Branch Name="4.2" Type="Product Version">
                  <FullProductName ProductID="P-12617V-4.2">Hospitality Guest Access Version 4.2</FullProductName>
               </Branch>
               <Branch Name="4.2.1" Type="Product Version">
                  <FullProductName ProductID="P-12617V-4.2.1">Hospitality Guest Access Version 4.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Hospitality Suite8" Type="Product Name">
               <Branch Name="8.10.2" Type="Product Version">
                  <FullProductName ProductID="P-12619V-8.10.2">Hospitality Suite8 Version 8.10.2</FullProductName>
               </Branch>
               <Branch Name="8.11-8.14" Type="Product Version">
                  <FullProductName ProductID="P-12619V-8.11-8.14">Hospitality Suite8 Version 8.11-8.14</FullProductName>
               </Branch>
               <Branch Name="8.9.6" Type="Product Version">
                  <FullProductName ProductID="P-12619V-8.9.6">Hospitality Suite8 Version 8.9.6</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Hyperion" Type="Product Family">
            <Branch Name="Hyperion BI+" Type="Product Name">
               <Branch Name="11.1.2.4" Type="Product Version">
                  <FullProductName ProductID="P-4361V-11.1.2.4">Hyperion BI+ Version 11.1.2.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Hyperion Planning" Type="Product Name">
               <Branch Name="11.1.2.4" Type="Product Version">
                  <FullProductName ProductID="P-4402V-11.1.2.4">Hyperion Planning Version 11.1.2.4</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Insurance Applications" Type="Product Family">
            <Branch Name="Insurance Policy Administration J2EE" Type="Product Name">
               <Branch Name="10.0" Type="Product Version">
                  <FullProductName ProductID="P-5279V-10.0">Insurance Policy Administration J2EE Version 10.0</FullProductName>
               </Branch>
               <Branch Name="10.1" Type="Product Version">
                  <FullProductName ProductID="P-5279V-10.1">Insurance Policy Administration J2EE Version 10.1</FullProductName>
               </Branch>
               <Branch Name="10.2" Type="Product Version">
                  <FullProductName ProductID="P-5279V-10.2">Insurance Policy Administration J2EE Version 10.2</FullProductName>
               </Branch>
               <Branch Name="11.0" Type="Product Version">
                  <FullProductName ProductID="P-5279V-11.0">Insurance Policy Administration J2EE Version 11.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Insurance Rules Palette" Type="Product Name">
               <Branch Name="10.0" Type="Product Version">
                  <FullProductName ProductID="P-5288V-10.0">Insurance Rules Palette Version 10.0</FullProductName>
               </Branch>
               <Branch Name="10.1" Type="Product Version">
                  <FullProductName ProductID="P-5288V-10.1">Insurance Rules Palette Version 10.1</FullProductName>
               </Branch>
               <Branch Name="10.2" Type="Product Version">
                  <FullProductName ProductID="P-5288V-10.2">Insurance Rules Palette Version 10.2</FullProductName>
               </Branch>
               <Branch Name="11.0" Type="Product Version">
                  <FullProductName ProductID="P-5288V-11.0">Insurance Rules Palette Version 11.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Insurance Calculation Engine" Type="Product Name">
               <Branch Name="10.0" Type="Product Version">
                  <FullProductName ProductID="P-10837V-10.0">Insurance Calculation Engine Version 10.0</FullProductName>
               </Branch>
               <Branch Name="10.1" Type="Product Version">
                  <FullProductName ProductID="P-10837V-10.1">Insurance Calculation Engine Version 10.1</FullProductName>
               </Branch>
               <Branch Name="10.2" Type="Product Version">
                  <FullProductName ProductID="P-10837V-10.2">Insurance Calculation Engine Version 10.2</FullProductName>
               </Branch>
               <Branch Name="9.7" Type="Product Version">
                  <FullProductName ProductID="P-10837V-9.7">Insurance Calculation Engine Version 9.7</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle JD Edwards" Type="Product Family">
            <Branch Name="JD Edwards EnterpriseOne Tools" Type="Product Name">
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-4781V-9.2">JD Edwards EnterpriseOne Tools Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="JD Edwards World Security" Type="Product Name">
               <Branch Name="A9.3" Type="Product Version">
                  <FullProductName ProductID="P-4839V-A9.3">JD Edwards World Security Version A9.3</FullProductName>
               </Branch>
               <Branch Name="A9.3.1" Type="Product Version">
                  <FullProductName ProductID="P-4839V-A9.3.1">JD Edwards World Security Version A9.3.1</FullProductName>
               </Branch>
               <Branch Name="A9.4" Type="Product Version">
                  <FullProductName ProductID="P-4839V-A9.4">JD Edwards World Security Version A9.4</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Java SE" Type="Product Family">
            <Branch Name="Java SE JDK and JRE" Type="Product Name">
               <Branch Name="11.0.3" Type="Product Version">
                  <FullProductName ProductID="P-856V-11.0.3">Java SE JDK and JRE Version 11.0.3</FullProductName>
               </Branch>
               <Branch Name="12.0.1" Type="Product Version">
                  <FullProductName ProductID="P-856V-12.0.1">Java SE JDK and JRE Version 12.0.1</FullProductName>
               </Branch>
               <Branch Name="12.0.1; Java SE Embedded: 8u211" Type="Product Version">
                  <FullProductName ProductID="P-856V-12.0.1; Java SE Embedded: 8u211">Java SE JDK and JRE Version 12.0.1; Java SE Embedded: 8u211</FullProductName>
               </Branch>
               <Branch Name="8u212" Type="Product Version">
                  <FullProductName ProductID="P-856V-8u212">Java SE JDK and JRE Version 8u212</FullProductName>
               </Branch>
               <Branch Name="Java SE: 11.0.3" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE: 11.0.3">Java SE JDK and JRE Version Java SE: 11.0.3</FullProductName>
               </Branch>
               <Branch Name="Java SE: 7u221" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE: 7u221">Java SE JDK and JRE Version Java SE: 7u221</FullProductName>
               </Branch>
               <Branch Name="Java SE: 8u212" Type="Product Version">
                  <FullProductName ProductID="P-856V-Java SE: 8u212">Java SE JDK and JRE Version Java SE: 8u212</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle MySQL" Type="Product Family">
            <Branch Name="MySQL Workbench" Type="Product Name">
               <Branch Name="8.0.16 and prior" Type="Product Version">
                  <FullProductName ProductID="P-4627V-8.0.16 and prior">MySQL Workbench Version 8.0.16 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Server" Type="Product Name">
               <Branch Name="5.6.44 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.6.44 and prior">MySQL Server Version 5.6.44 and prior</FullProductName>
               </Branch>
               <Branch Name="5.7.18 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.7.18 and prior">MySQL Server Version 5.7.18 and prior</FullProductName>
               </Branch>
               <Branch Name="5.7.23 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.7.23 and prior">MySQL Server Version 5.7.23 and prior</FullProductName>
               </Branch>
               <Branch Name="5.7.25 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.7.25 and prior">MySQL Server Version 5.7.25 and prior</FullProductName>
               </Branch>
               <Branch Name="5.7.26 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-5.7.26 and prior">MySQL Server Version 5.7.26 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.12 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-8.0.12 and prior">MySQL Server Version 8.0.12 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.15 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-8.0.15 and prior">MySQL Server Version 8.0.15 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.16 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8478V-8.0.16 and prior">MySQL Server Version 8.0.16 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MySQL Enterprise Monitor" Type="Product Name">
               <Branch Name="4.0.9 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8480V-4.0.9 and prior">MySQL Enterprise Monitor Version 4.0.9 and prior</FullProductName>
               </Branch>
               <Branch Name="8.0.14 and prior" Type="Product Version">
                  <FullProductName ProductID="P-8480V-8.0.14 and prior">MySQL Enterprise Monitor Version 8.0.14 and prior</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle PeopleSoft" Type="Product Family">
            <Branch Name="PeopleSoft Enterprise FIN Project Costing" Type="Product Name">
               <Branch Name="9.2" Type="Product Version">
                  <FullProductName ProductID="P-5013V-9.2">PeopleSoft Enterprise FIN Project Costing Version 9.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="PeopleSoft Enterprise PT PeopleTools" Type="Product Name">
               <Branch Name="8.55" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.55">PeopleSoft Enterprise PT PeopleTools Version 8.55</FullProductName>
               </Branch>
               <Branch Name="8.56" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.56">PeopleSoft Enterprise PT PeopleTools Version 8.56</FullProductName>
               </Branch>
               <Branch Name="8.57" Type="Product Version">
                  <FullProductName ProductID="P-5085V-8.57">PeopleSoft Enterprise PT PeopleTools Version 8.57</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Retail Applications" Type="Product Family">
            <Branch Name="Retail Advanced Inventory Planning" Type="Product Name">
               <Branch Name="15.0" Type="Product Version">
                  <FullProductName ProductID="P-1785V-15.0">Retail Advanced Inventory Planning Version 15.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Integration Bus" Type="Product Name">
               <Branch Name="15.0" Type="Product Version">
                  <FullProductName ProductID="P-1807V-15.0">Retail Integration Bus Version 15.0</FullProductName>
               </Branch>
               <Branch Name="16.0" Type="Product Version">
                  <FullProductName ProductID="P-1807V-16.0">Retail Integration Bus Version 16.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Predictive Application Server" Type="Product Name">
               <Branch Name="14.0.3.26" Type="Product Version">
                  <FullProductName ProductID="P-1823V-14.0.3.26">Retail Predictive Application Server Version 14.0.3.26</FullProductName>
               </Branch>
               <Branch Name="14.1.3.37" Type="Product Version">
                  <FullProductName ProductID="P-1823V-14.1.3.37">Retail Predictive Application Server Version 14.1.3.37</FullProductName>
               </Branch>
               <Branch Name="15.0.3.100" Type="Product Version">
                  <FullProductName ProductID="P-1823V-15.0.3.100">Retail Predictive Application Server Version 15.0.3.100</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Financial Integration" Type="Product Name">
               <Branch Name="14.0" Type="Product Version">
                  <FullProductName ProductID="P-10722V-14.0">Retail Financial Integration Version 14.0</FullProductName>
               </Branch>
               <Branch Name="14.1" Type="Product Version">
                  <FullProductName ProductID="P-10722V-14.1">Retail Financial Integration Version 14.1</FullProductName>
               </Branch>
               <Branch Name="15.0" Type="Product Version">
                  <FullProductName ProductID="P-10722V-15.0">Retail Financial Integration Version 15.0</FullProductName>
               </Branch>
               <Branch Name="16.0" Type="Product Version">
                  <FullProductName ProductID="P-10722V-16.0">Retail Financial Integration Version 16.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Service Backbone" Type="Product Name">
               <Branch Name="16.0.1" Type="Product Version">
                  <FullProductName ProductID="P-10867V-16.0.1">Retail Service Backbone Version 16.0.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="XBRi Cloud Service" Type="Product Name">
               <Branch Name="10.8.0 - 10.8.3" Type="Product Version">
                  <FullProductName ProductID="P-11506V-10.8.0 - 10.8.3">XBRi Cloud Service Version 10.8.0 - 10.8.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Xstore Point of Service" Type="Product Name">
               <Branch Name="15.0" Type="Product Version">
                  <FullProductName ProductID="P-11513V-15.0">Retail Xstore Point of Service Version 15.0</FullProductName>
               </Branch>
               <Branch Name="16.0" Type="Product Version">
                  <FullProductName ProductID="P-11513V-16.0">Retail Xstore Point of Service Version 16.0</FullProductName>
               </Branch>
               <Branch Name="17.0" Type="Product Version">
                  <FullProductName ProductID="P-11513V-17.0">Retail Xstore Point of Service Version 17.0</FullProductName>
               </Branch>
               <Branch Name="18.0" Type="Product Version">
                  <FullProductName ProductID="P-11513V-18.0">Retail Xstore Point of Service Version 18.0</FullProductName>
               </Branch>
               <Branch Name="7.0" Type="Product Version">
                  <FullProductName ProductID="P-11513V-7.0">Retail Xstore Point of Service Version 7.0</FullProductName>
               </Branch>
               <Branch Name="7.1" Type="Product Version">
                  <FullProductName ProductID="P-11513V-7.1">Retail Xstore Point of Service Version 7.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Order Management System Cloud Service" Type="Product Name">
               <Branch Name="5.0" Type="Product Version">
                  <FullProductName ProductID="P-11519V-5.0">Retail Order Management System Cloud Service Version 5.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Order Broker Cloud Service" Type="Product Name">
               <Branch Name="15.0" Type="Product Version">
                  <FullProductName ProductID="P-11520V-15.0">Retail Order Broker Cloud Service Version 15.0</FullProductName>
               </Branch>
               <Branch Name="5.2" Type="Product Version">
                  <FullProductName ProductID="P-11520V-5.2">Retail Order Broker Cloud Service Version 5.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Xstore Office" Type="Product Name">
               <Branch Name="7.0" Type="Product Version">
                  <FullProductName ProductID="P-11560V-7.0">Retail Xstore Office Version 7.0</FullProductName>
               </Branch>
               <Branch Name="7.1" Type="Product Version">
                  <FullProductName ProductID="P-11560V-7.1">Retail Xstore Office Version 7.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="MICROS Retail-J" Type="Product Name">
               <Branch Name="12.1.0" Type="Product Version">
                  <FullProductName ProductID="P-11567V-12.1.0">MICROS Retail-J Version 12.1.0</FullProductName>
               </Branch>
               <Branch Name="12.1.1" Type="Product Version">
                  <FullProductName ProductID="P-11567V-12.1.1">MICROS Retail-J Version 12.1.1</FullProductName>
               </Branch>
               <Branch Name="12.1.2" Type="Product Version">
                  <FullProductName ProductID="P-11567V-12.1.2">MICROS Retail-J Version 12.1.2</FullProductName>
               </Branch>
               <Branch Name="13.1" Type="Product Version">
                  <FullProductName ProductID="P-11567V-13.1">MICROS Retail-J Version 13.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Retail Customer Management and Segmentation Foundation" Type="Product Name">
               <Branch Name="16.0" Type="Product Version">
                  <FullProductName ProductID="P-13388V-16.0">Retail Customer Management and Segmentation Foundation Version 16.0</FullProductName>
               </Branch>
               <Branch Name="17.0" Type="Product Version">
                  <FullProductName ProductID="P-13388V-17.0">Retail Customer Management and Segmentation Foundation Version 17.0</FullProductName>
               </Branch>
               <Branch Name="18.0" Type="Product Version">
                  <FullProductName ProductID="P-13388V-18.0">Retail Customer Management and Segmentation Foundation Version 18.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Siebel CRM" Type="Product Family">
            <Branch Name="Siebel Core - Server Framework" Type="Product Name">
               <Branch Name="19.0 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9001V-19.0 and prior">Siebel Core - Server Framework Version 19.0 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Siebel UI Framework" Type="Product Name">
               <Branch Name="19.0 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9011V-19.0 and prior">Siebel UI Framework Version 19.0 and prior</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Siebel Core - Common Components" Type="Product Name">
               <Branch Name="19.0 and prior" Type="Product Version">
                  <FullProductName ProductID="P-9747V-19.0 and prior">Siebel Core - Common Components Version 19.0 and prior</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Supply Chain" Type="Product Family">
            <Branch Name="Transportation Management" Type="Product Name">
               <Branch Name="6.3.7" Type="Product Version">
                  <FullProductName ProductID="P-1991V-6.3.7">Transportation Management Version 6.3.7</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Demantra Demand Management" Type="Product Name">
               <Branch Name="7.3.1.5.2" Type="Product Version">
                  <FullProductName ProductID="P-2100V-7.3.1.5.2">Demantra Demand Management Version 7.3.1.5.2</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Agile Engineering Data Management" Type="Product Name">
               <Branch Name="6.2.0" Type="Product Version">
                  <FullProductName ProductID="P-4436V-6.2.0">Agile Engineering Data Management Version 6.2.0</FullProductName>
               </Branch>
               <Branch Name="6.2.1" Type="Product Version">
                  <FullProductName ProductID="P-4436V-6.2.1">Agile Engineering Data Management Version 6.2.1</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Agile PLM Framework" Type="Product Name">
               <Branch Name="9.3.3" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.3">Agile PLM Framework Version 9.3.3</FullProductName>
               </Branch>
               <Branch Name="9.3.4" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.4">Agile PLM Framework Version 9.3.4</FullProductName>
               </Branch>
               <Branch Name="9.3.5" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.5">Agile PLM Framework Version 9.3.5</FullProductName>
               </Branch>
               <Branch Name="9.3.6" Type="Product Version">
                  <FullProductName ProductID="P-4461V-9.3.6">Agile PLM Framework Version 9.3.6</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Support Tools" Type="Product Family">
            <Branch Name="OSS Support Tools" Type="Product Name">
               <Branch Name="19.2" Type="Product Version">
                  <FullProductName ProductID="P-1330V-19.2">OSS Support Tools Version 19.2</FullProductName>
               </Branch>
               <Branch Name="Prior to 2.12.36" Type="Product Version">
                  <FullProductName ProductID="P-1330V-Prior to 2.12.36">OSS Support Tools Version Prior to 2.12.36</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Systems" Type="Product Family">
            <Branch Name="Solaris Operating System" Type="Product Name">
               <Branch Name="10" Type="Product Version">
                  <FullProductName ProductID="P-10006V-10">Solaris Operating System Version 10</FullProductName>
               </Branch>
               <Branch Name="11.3" Type="Product Version">
                  <FullProductName ProductID="P-10006V-11.3">Solaris Operating System Version 11.3</FullProductName>
               </Branch>
               <Branch Name="11.4" Type="Product Version">
                  <FullProductName ProductID="P-10006V-11.4">Solaris Operating System Version 11.4</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Sun ZFS Storage Appliance Kit (AK) Software" Type="Product Name">
               <Branch Name="8.8.3" Type="Product Version">
                  <FullProductName ProductID="P-10026V-8.8.3">Sun ZFS Storage Appliance Kit (AK) Software Version 8.8.3</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Tape General STA - StorageTek Tape Analytics SW Tool" Type="Product Name">
               <Branch Name="2.3.0" Type="Product Version">
                  <FullProductName ProductID="P-10085V-2.3.0">Tape General STA - StorageTek Tape Analytics SW Tool Version 2.3.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Tape Virtual VSM GUI - Virtual Storage Manager GUI" Type="Product Name">
               <Branch Name="6.2" Type="Product Version">
                  <FullProductName ProductID="P-10118V-6.2">Tape Virtual VSM GUI - Virtual Storage Manager GUI Version 6.2</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Utilities Applications" Type="Product Family">
            <Branch Name="Utilities Framework" Type="Product Name">
               <Branch Name="4.3.0.2.0-4.3.0.6.0" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.3.0.2.0-4.3.0.6.0">Utilities Framework Version 4.3.0.2.0-4.3.0.6.0</FullProductName>
               </Branch>
               <Branch Name="4.4.0.0.0" Type="Product Version">
                  <FullProductName ProductID="P-2245V-4.4.0.0.0">Utilities Framework Version 4.4.0.0.0</FullProductName>
               </Branch>
            </Branch>
            <Branch Name="Utilities Advanced Spatial and Operational Analytics" Type="Product Name">
               <Branch Name="2.7.0.1" Type="Product Version">
                  <FullProductName ProductID="P-8793V-2.7.0.1">Utilities Advanced Spatial and Operational Analytics Version 2.7.0.1</FullProductName>
               </Branch>
            </Branch>
         </Branch>
         <Branch Name="Oracle Virtualization" Type="Product Family">
            <Branch Name="VM VirtualBox" Type="Product Name">
               <Branch Name="Prior to 5.2.32" Type="Product Version">
                  <FullProductName ProductID="P-8370V-Prior to 5.2.32">VM VirtualBox Version Prior to 5.2.32</FullProductName>
               </Branch>
               <Branch Name="prior to 6.0.10" Type="Product Version">
                  <FullProductName ProductID="P-8370V-prior to 6.0.10">VM VirtualBox Version prior to 6.0.10</FullProductName>
               </Branch>
            </Branch>
         </Branch>
      </Branch>
   </ProductTree>
   <Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2014-0114</Title>
      <Notes>
         <Note Audience="All" Ordinal="1" Title="Details" Type="Details">Vulnerability in the Oracle Insurance IFRS 17 Analyzer product of Oracle Financial Services Applications (component: UI (Beanutils)).  Supported versions that are affected are 8.0.6 and 8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance IFRS 17 Analyzer.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Insurance IFRS 17 Analyzer accessible data as well as  unauthorized read access to a subset of Oracle Insurance IFRS 17 Analyzer accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Insurance IFRS 17 Analyzer. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2014-0114</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13809V-8.0.6</ProductID>
            <ProductID>P-13809V-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13809V-8.0.6</ProductID>
            <ProductID>P-13809V-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-0226</Title>
      <Notes>
         <Note Audience="All" Ordinal="2" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security (Apache WSS4J)).  Supported versions that are affected are 8.55, 8.56 and  8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-0226</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-9251</Title>
      <Notes>
         <Note Audience="All" Ordinal="3" Title="Details" Type="Details">Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: BI Platform Security (jQuery)).  Supported versions that are affected are 11.1.1.9.0 and  12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-9251</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2025V-11.1.1.9.0</ProductID>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2025V-11.1.1.9.0</ProductID>
            <ProductID>P-2025V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-9251</Title>
      <Notes>
         <Note Audience="All" Ordinal="4" Title="Details" Type="Details">Vulnerability in the Oracle Communications Application Session Controller product of Oracle Communications (component: Security (jQuery)).  Supported versions that are affected are 3.7.1 and 3.8.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Application Session Controller.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Application Session Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Application Session Controller accessible data as well as  unauthorized read access to a subset of Oracle Communications Application Session Controller accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-9251</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10769V-3.7.1</ProductID>
            <ProductID>P-10769V-3.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10769V-3.7.1</ProductID>
            <ProductID>P-10769V-3.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-9251</Title>
      <Notes>
         <Note Audience="All" Ordinal="5" Title="Details" Type="Details">Vulnerability in the Diagnostic Assistant product of Oracle Support Tools (component: Libraries (Jsch and jQuery)).   The supported version that is affected is Prior to 2.12.36. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Diagnostic Assistant.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Diagnostic Assistant, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Diagnostic Assistant accessible data as well as  unauthorized read access to a subset of Diagnostic Assistant accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-9251</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1330V-Prior to 2.12.36</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1330V-Prior to 2.12.36</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2015-9251</Title>
      <Notes>
         <Note Audience="All" Ordinal="6" Title="Details" Type="Details">Vulnerability in the Primavera Unifier product of Oracle Construction and Engineering (component: Core (jQuery)).  Supported versions that are affected are 16.1, 16.2, 17.7-17.12 and 18.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Unifier, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Primavera Unifier accessible data as well as  unauthorized read access to a subset of Primavera Unifier accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2015-9251</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.1</ProductID>
            <ProductID>P-10354V-16.2</ProductID>
            <ProductID>P-10354V-17.7-17.12</ProductID>
            <ProductID>P-10354V-18.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10354V-16.1</ProductID>
            <ProductID>P-10354V-16.2</ProductID>
            <ProductID>P-10354V-17.7-17.12</ProductID>
            <ProductID>P-10354V-18.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="7" Title="Details" Type="Details">Vulnerability in the Oracle Agile Engineering Data Management product of Oracle Supply Chain (component: Installation Issues (Apache Commons FileUpload)).  Supported versions that are affected are 6.2.0 and  6.2.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile Engineering Data Management.  Successful attacks of this vulnerability can result in takeover of Oracle Agile Engineering Data Management. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4436V-6.2.0</ProductID>
            <ProductID>P-4436V-6.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4436V-6.2.0</ProductID>
            <ProductID>P-4436V-6.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="8" Title="Details" Type="Details">Vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager (component: Load Testing for Web Apps (Apache Commons FileUpload)).  Supported versions that are affected are 13.1, 13.2 and  13.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Testing Suite.  Successful attacks of this vulnerability can result in takeover of Oracle Application Testing Suite. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4622V-13.1</ProductID>
            <ProductID>P-4622V-13.2</ProductID>
            <ProductID>P-4622V-13.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4622V-13.1</ProductID>
            <ProductID>P-4622V-13.2</ProductID>
            <ProductID>P-4622V-13.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="9" Title="Details" Type="Details">Vulnerability in the Oracle Communications Application Session Controller product of Oracle Communications (component: Security (Apache Commons FileUpload)).  Supported versions that are affected are 3.7.1 and 3.8.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Application Session Controller.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Application Session Controller. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10769V-3.7.1</ProductID>
            <ProductID>P-10769V-3.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10769V-3.7.1</ProductID>
            <ProductID>P-10769V-3.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="10" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Core Banking product of Oracle Financial Services Applications (component: Securities (Apache Commons FileUpload)).  Supported versions that are affected are 5.2.0, 11.6.0, 11.7.0 and 11.8.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Core Banking.  Successful attacks of this vulnerability can result in takeover of Oracle FLEXCUBE Core Banking. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9101V-5.2.0</ProductID>
            <ProductID>P-9101V-11.6.0</ProductID>
            <ProductID>P-9101V-11.7.0</ProductID>
            <ProductID>P-9101V-11.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9101V-5.2.0</ProductID>
            <ProductID>P-9101V-11.6.0</ProductID>
            <ProductID>P-9101V-11.7.0</ProductID>
            <ProductID>P-9101V-11.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="11" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management product of Oracle Financial Services Applications (component: Infrastructure (Apache Commons FileUpload)).  Supported versions that are affected are 12.0 and 12.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management.  Successful attacks of this vulnerability can result in takeover of Oracle FLEXCUBE Enterprise Limits and Collateral Management. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9100V-12.0</ProductID>
            <ProductID>P-9100V-12.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9100V-12.0</ProductID>
            <ProductID>P-9100V-12.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="12" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure (Apache Commons FileUpload)).  Supported versions that are affected are 12.0.1-12.0.3 and 12.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in takeover of Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="13" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Calculation Engine product of Oracle Insurance Applications (component: Core (Apache Commons FileUpload)).  Supported versions that are affected are 9.7, 10.0, 10.1 and 10.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Calculation Engine.  Successful attacks of this vulnerability can result in takeover of Oracle Insurance Calculation Engine. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10837V-9.7</ProductID>
            <ProductID>P-10837V-10.0</ProductID>
            <ProductID>P-10837V-10.1</ProductID>
            <ProductID>P-10837V-10.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10837V-9.7</ProductID>
            <ProductID>P-10837V-10.0</ProductID>
            <ProductID>P-10837V-10.1</ProductID>
            <ProductID>P-10837V-10.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="14" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="14" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration J2EE product of Oracle Insurance Applications (component: Core (Apache Commons FileUpload)).  Supported versions that are affected are 10.0, 10.1, 10.2 and 11.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration J2EE.  Successful attacks of this vulnerability can result in takeover of Oracle Insurance Policy Administration J2EE. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5279V-10.0</ProductID>
            <ProductID>P-5279V-10.1</ProductID>
            <ProductID>P-5279V-10.2</ProductID>
            <ProductID>P-5279V-11.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5279V-10.0</ProductID>
            <ProductID>P-5279V-10.1</ProductID>
            <ProductID>P-5279V-10.2</ProductID>
            <ProductID>P-5279V-11.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="15" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="15" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Rules Palette product of Oracle Insurance Applications (component: Core (Apache Commons FileUpload)).  Supported versions that are affected are 10.0, 10.1, 10.2 and 11.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Rules Palette.  Successful attacks of this vulnerability can result in takeover of Oracle Insurance Rules Palette. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5288V-10.0</ProductID>
            <ProductID>P-5288V-10.1</ProductID>
            <ProductID>P-5288V-10.2</ProductID>
            <ProductID>P-5288V-11.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5288V-10.0</ProductID>
            <ProductID>P-5288V-10.1</ProductID>
            <ProductID>P-5288V-10.2</ProductID>
            <ProductID>P-5288V-11.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="16" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="16" Title="Details" Type="Details">Vulnerability in the Oracle Retail Integration Bus product of Oracle Retail Applications (component: RIB Kernal (Apache Commons FileUpload)).  Supported versions that are affected are 15.0 and  16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Integration Bus.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Integration Bus. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1807V-15.0</ProductID>
            <ProductID>P-1807V-16.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1807V-15.0</ProductID>
            <ProductID>P-1807V-16.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="17" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="17" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced UI (Apache Commons FileUpload)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites.  Successful attacks of this vulnerability can result in takeover of Oracle WebCenter Sites. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9617V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9617V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="18" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1000031</Title>
      <Notes>
         <Note Audience="All" Ordinal="18" Title="Details" Type="Details">Vulnerability in the MICROS Retail XBRi Loss Prevention product of Oracle Retail Applications (component: Retail (Apache Commons FileUpload)).  Supported versions that are affected are 10.8.0 - 10.8.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise MICROS Retail XBRi Loss Prevention.  Successful attacks of this vulnerability can result in takeover of MICROS Retail XBRi Loss Prevention. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1000031</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11506V-10.8.0 - 10.8.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11506V-10.8.0 - 10.8.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="19" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-1181</Title>
      <Notes>
         <Note Audience="All" Ordinal="19" Title="Details" Type="Details">Vulnerability in the Oracle Retail Order Management System product of Oracle Retail Applications (component: Upgrade Install (Apache Struts 1)).   The supported version that is affected is 5.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Order Management System.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Order Management System. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-1181</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11519V-5.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11519V-5.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="20" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-6814</Title>
      <Notes>
         <Note Audience="All" Ordinal="20" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Framework product of Oracle Utilities Applications (component: Scripting (Groovy)).  Supported versions that are affected are 4.3.0.2.0-4.3.0.6.0 and  4.4.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Framework.  Successful attacks of this vulnerability can result in takeover of Oracle Utilities Framework. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-6814</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2245V-4.3.0.2.0-4.3.0.6.0</ProductID>
            <ProductID>P-2245V-4.4.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2245V-4.3.0.2.0-4.3.0.6.0</ProductID>
            <ProductID>P-2245V-4.4.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="21" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-6814</Title>
      <Notes>
         <Note Audience="All" Ordinal="21" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced UI (Apache Groovy)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle WebCenter Sites. CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-6814</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9617V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9617V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="22" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-7103</Title>
      <Notes>
         <Note Audience="All" Ordinal="22" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console (jQuery)).  Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as  unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-7103</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0.0</ProductID>
            <ProductID>P-5242V-12.1.3.0.0</ProductID>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5242V-10.3.6.0.0</ProductID>
            <ProductID>P-5242V-12.1.3.0.0</ProductID>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="23" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2016-9572</Title>
      <Notes>
         <Note Audience="All" Ordinal="23" Title="Details" Type="Details">Vulnerability in the Spatial component of Oracle Database Server.  Supported versions that are affected are 12.2.0.1 and  18c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via OracleNet to compromise Spatial.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Spatial. CVSS 3.0 Base Score 3.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2016-9572</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-619V-12.2.0.1</ProductID>
            <ProductID>P-619V-18c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-619V-12.2.0.1</ProductID>
            <ProductID>P-619V-18c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="24" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-14735</Title>
      <Notes>
         <Note Audience="All" Ordinal="24" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Core Banking product of Oracle Financial Services Applications (component: Security (AntiSamy)).  Supported versions that are affected are 5.2.0, 11.6.0, 11.7.0 and 11.8.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Core Banking.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Core Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Core Banking accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Core Banking accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-14735</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9101V-5.2.0</ProductID>
            <ProductID>P-9101V-11.6.0</ProductID>
            <ProductID>P-9101V-11.7.0</ProductID>
            <ProductID>P-9101V-11.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9101V-5.2.0</ProductID>
            <ProductID>P-9101V-11.6.0</ProductID>
            <ProductID>P-9101V-11.7.0</ProductID>
            <ProductID>P-9101V-11.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="25" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-14735</Title>
      <Notes>
         <Note Audience="All" Ordinal="25" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Calculation Engine product of Oracle Insurance Applications (component: Core (AntiSamy)).  Supported versions that are affected are 9.7, 10.0, 10.1 and 10.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Calculation Engine.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Insurance Calculation Engine, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Insurance Calculation Engine accessible data as well as  unauthorized read access to a subset of Oracle Insurance Calculation Engine accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-14735</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10837V-9.7</ProductID>
            <ProductID>P-10837V-10.0</ProductID>
            <ProductID>P-10837V-10.1</ProductID>
            <ProductID>P-10837V-10.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10837V-9.7</ProductID>
            <ProductID>P-10837V-10.0</ProductID>
            <ProductID>P-10837V-10.1</ProductID>
            <ProductID>P-10837V-10.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="26" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-3736</Title>
      <Notes>
         <Note Audience="All" Ordinal="26" Title="Details" Type="Details">Vulnerability in the Oracle Communications EAGLE (Software) product of Oracle Communications (component: Security (OpenSSL)).  Supported versions that are affected are 46.5, 46.6 and 46.7. Easily exploitable vulnerability allows low privileged attacker with network access via TLS to compromise Oracle Communications EAGLE (Software).  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications EAGLE (Software) accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-3736</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10768V-46.5</ProductID>
            <ProductID>P-10768V-46.6</ProductID>
            <ProductID>P-10768V-46.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10768V-46.5</ProductID>
            <ProductID>P-10768V-46.6</ProductID>
            <ProductID>P-10768V-46.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="27" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="27" Title="Details" Type="Details">Vulnerability in the Oracle Communications Interactive Session Recorder product of Oracle Communications (component: Security (Apache Log4j)).  Supported versions that are affected are 6.0, 6.1 and 6.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Interactive Session Recorder.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Interactive Session Recorder. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10765V-6.0</ProductID>
            <ProductID>P-10765V-6.1</ProductID>
            <ProductID>P-10765V-6.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10765V-6.0</ProductID>
            <ProductID>P-10765V-6.1</ProductID>
            <ProductID>P-10765V-6.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="28" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="28" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Installation SEC (Apache Log4j)).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="29" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="29" Title="Details" Type="Details">Vulnerability in the Oracle SOA Suite product of Oracle Fusion Middleware (component: Installation &amp; Templates (Apache Log4j)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SOA Suite.  Successful attacks of this vulnerability can result in takeover of Oracle SOA Suite. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1162V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1162V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="30" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5645</Title>
      <Notes>
         <Note Audience="All" Ordinal="30" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Advanced Spatial and Operational Analytics product of Oracle Utilities Applications (component: Install (Apache Log4j)).   The supported version that is affected is 2.7.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Advanced Spatial and Operational Analytics.  Successful attacks of this vulnerability can result in takeover of Oracle Utilities Advanced Spatial and Operational Analytics. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5645</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8793V-2.7.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8793V-2.7.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="31" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5664</Title>
      <Notes>
         <Note Audience="All" Ordinal="31" Title="Details" Type="Details">Vulnerability in the Oracle Communications Interactive Session Recorder product of Oracle Communications (component: Security (Apache Tomcat)).  Supported versions that are affected are 6.0, 6.1 and 6.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Interactive Session Recorder.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Communications Interactive Session Recorder accessible data. CVSS 3.0 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5664</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10765V-6.0</ProductID>
            <ProductID>P-10765V-6.1</ProductID>
            <ProductID>P-10765V-6.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10765V-6.0</ProductID>
            <ProductID>P-10765V-6.1</ProductID>
            <ProductID>P-10765V-6.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="32" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2017-5715</Title>
      <Notes>
         <Note Audience="All" Ordinal="32" Title="Details" Type="Details">Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: Security (Kernel)).  Supported versions that are affected are 8.0, 8.1, 8.2 and 8.3. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Diameter Signaling Router (DSR) executes to compromise Oracle Communications Diameter Signaling Router (DSR).  While the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.0 Base Score 5.6 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2017-5715</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10899V-8.0</ProductID>
            <ProductID>P-10899V-8.1</ProductID>
            <ProductID>P-10899V-8.2</ProductID>
            <ProductID>P-10899V-8.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.6</BaseScore>
            <Vector>AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10899V-8.0</ProductID>
            <ProductID>P-10899V-8.1</ProductID>
            <ProductID>P-10899V-8.2</ProductID>
            <ProductID>P-10899V-8.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="33" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0732</Title>
      <Notes>
         <Note Audience="All" Ordinal="33" Title="Details" Type="Details">Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: Signaling (OpenSSL)).  Supported versions that are affected are 8.0, 8.1, 8.2 and 8.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Communications Diameter Signaling Router (DSR).  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Diameter Signaling Router (DSR). CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0732</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10899V-8.0</ProductID>
            <ProductID>P-10899V-8.1</ProductID>
            <ProductID>P-10899V-8.2</ProductID>
            <ProductID>P-10899V-8.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10899V-8.0</ProductID>
            <ProductID>P-10899V-8.1</ProductID>
            <ProductID>P-10899V-8.2</ProductID>
            <ProductID>P-10899V-8.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="34" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-0734</Title>
      <Notes>
         <Note Audience="All" Ordinal="34" Title="Details" Type="Details">Vulnerability in the Oracle Endeca Server product of Oracle Fusion Middleware (component: Product Code (OpenSSL)).   The supported version that is affected is 7.7.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Endeca Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Endeca Server accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-0734</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10217V-7.7.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10217V-7.7.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="35" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1000120</Title>
      <Notes>
         <Note Audience="All" Ordinal="35" Title="Details" Type="Details">Vulnerability in the Oracle Communications Application Session Controller product of Oracle Communications (component: Security (cURL)).  Supported versions that are affected are 3.7.1 and  3.8.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Application Session Controller.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Communications Application Session Controller. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1000120</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10769V-3.7.1</ProductID>
            <ProductID>P-10769V-3.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10769V-3.7.1</ProductID>
            <ProductID>P-10769V-3.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="36" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1000180</Title>
      <Notes>
         <Note Audience="All" Ordinal="36" Title="Details" Type="Details">Vulnerability in the Oracle Data Integrator product of Oracle Fusion Middleware (component: Runtime Java agent for ODI (Bouncy Castle Java Library)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Data Integrator.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Data Integrator accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1000180</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2196V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2196V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="37" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1000180</Title>
      <Notes>
         <Note Audience="All" Ordinal="37" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for Fusion Middleware product of Oracle Enterprise Manager (component: Application Replay (Bouncy Castle Java Library)).  Supported versions that are affected are 13.2 and 13.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Fusion Middleware.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Enterprise Manager for Fusion Middleware accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1000180</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1369V-13.2</ProductID>
            <ProductID>P-1369V-13.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1369V-13.2</ProductID>
            <ProductID>P-1369V-13.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="38" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-11058</Title>
      <Notes>
         <Note Audience="All" Ordinal="38" Title="Details" Type="Details">Vulnerability in the Core RDBMS component of Oracle Database Server.  Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and  19c. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCPS / HTTPS to compromise Core RDBMS.  Successful attacks of this vulnerability can result in takeover of Core RDBMS.  Note: Client Score for CVE-2018-11058 is 8.1 with Attack Complexity as High. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-11058</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
            <ProductID>P-5V-18c</ProductID>
            <ProductID>P-5V-19c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
            <ProductID>P-5V-18c</ProductID>
            <ProductID>P-5V-19c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="39" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-11058</Title>
      <Notes>
         <Note Audience="All" Ordinal="39" Title="Details" Type="Details">Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: SSL API (RSA BSAFE)).  Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and  12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Security Service.  Successful attacks of this vulnerability can result in takeover of Oracle Security Service. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-11058</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-991V-11.1.1.9.0</ProductID>
            <ProductID>P-991V-12.1.3.0.0</ProductID>
            <ProductID>P-991V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-991V-11.1.1.9.0</ProductID>
            <ProductID>P-991V-12.1.3.0.0</ProductID>
            <ProductID>P-991V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="40" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-11775</Title>
      <Notes>
         <Note Audience="All" Ordinal="40" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Reporting Framework (Apache ActiveMQ)).  Supported versions that are affected are 12.1.0.5.0, 13.2.0.0.0 and  13.3.0.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Manager Base Platform.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Enterprise Manager Base Platform accessible data as well as  unauthorized access to critical data or complete access to all Oracle Enterprise Manager Base Platform accessible data. CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-11775</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-12.1.0.5.0</ProductID>
            <ProductID>P-1370V-13.2.0.0.0</ProductID>
            <ProductID>P-1370V-13.3.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.8</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1370V-12.1.0.5.0</ProductID>
            <ProductID>P-1370V-13.2.0.0.0</ProductID>
            <ProductID>P-1370V-13.3.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="41" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-11784</Title>
      <Notes>
         <Note Audience="All" Ordinal="41" Title="Details" Type="Details">Vulnerability in the Oracle Agile Engineering Data Management product of Oracle Supply Chain (component: Installation Issues (Apache Tomcat)).  Supported versions that are affected are 6.2.0 and  6.2.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile Engineering Data Management.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Agile Engineering Data Management accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-11784</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4436V-6.2.0</ProductID>
            <ProductID>P-4436V-6.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4436V-6.2.0</ProductID>
            <ProductID>P-4436V-6.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="42" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-11784</Title>
      <Notes>
         <Note Audience="All" Ordinal="42" Title="Details" Type="Details">Vulnerability in the MICROS Retail XBRi Loss Prevention product of Oracle Retail Applications (component: Retail (Apache Tomcat)).  Supported versions that are affected are 10.8.0 - 10.8.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise MICROS Retail XBRi Loss Prevention.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MICROS Retail XBRi Loss Prevention accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-11784</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11506V-10.8.0 - 10.8.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11506V-10.8.0 - 10.8.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="43" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-12023</Title>
      <Notes>
         <Note Audience="All" Ordinal="43" Title="Details" Type="Details">Vulnerability in the Oracle Utilities Advanced Spatial and Operational Analytics product of Oracle Utilities Applications (component: Install (jackson-databind)).   The supported version that is affected is 2.7.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Utilities Advanced Spatial and Operational Analytics.  Successful attacks of this vulnerability can result in takeover of Oracle Utilities Advanced Spatial and Operational Analytics. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-12023</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8793V-2.7.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8793V-2.7.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="44" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1258</Title>
      <Notes>
         <Note Audience="All" Ordinal="44" Title="Details" Type="Details">Vulnerability in the Oracle Retail Predictive Application Server product of Oracle Retail Applications (component: RPAS Fusion Client (Spring Framework)).  Supported versions that are affected are 14.0.3.26, 
14.1.3.37 and 
15.0.3.100. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Predictive Application Server.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Predictive Application Server. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1258</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1823V-14.0.3.26</ProductID>
            <ProductID>P-1823V-14.1.3.37</ProductID>
            <ProductID>P-1823V-15.0.3.100</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1823V-14.0.3.26</ProductID>
            <ProductID>P-1823V-14.1.3.37</ProductID>
            <ProductID>P-1823V-15.0.3.100</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="45" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1258</Title>
      <Notes>
         <Note Audience="All" Ordinal="45" Title="Details" Type="Details">Vulnerability in the Oracle Retail Service Backbone product of Oracle Retail Applications (component: Install (Spring Framework)).   The supported version that is affected is 16.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Service Backbone.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Service Backbone. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1258</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10867V-16.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.8</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10867V-16.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="46" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-1275</Title>
      <Notes>
         <Note Audience="All" Ordinal="46" Title="Details" Type="Details">Vulnerability in the Oracle Communications Converged Application Server - Service Controller product of Oracle Communications (component: Security (Spring Framework)).  Supported versions that are affected are 6.0 and 6.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Converged Application Server - Service Controller.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Converged Application Server - Service Controller. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-1275</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10593V-6.0</ProductID>
            <ProductID>P-10593V-6.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10593V-6.0</ProductID>
            <ProductID>P-10593V-6.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="47" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="47" Title="Details" Type="Details">Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Security (Spring Framework)).  Supported versions that are affected are 9.3.3, 9.3.4, 9.3.5 and  9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Agile PLM. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4461V-9.3.3</ProductID>
            <ProductID>P-4461V-9.3.4</ProductID>
            <ProductID>P-4461V-9.3.5</ProductID>
            <ProductID>P-4461V-9.3.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4461V-9.3.3</ProductID>
            <ProductID>P-4461V-9.3.4</ProductID>
            <ProductID>P-4461V-9.3.5</ProductID>
            <ProductID>P-4461V-9.3.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="48" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="48" Title="Details" Type="Details">Vulnerability in the Oracle Endeca Information Discovery Integrator product of Oracle Fusion Middleware (component: Other Issues (Spring Framework)).   The supported version that is affected is 3.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Endeca Information Discovery Integrator.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Endeca Information Discovery Integrator. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10561V-3.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10561V-3.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="49" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="49" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Private Banking product of Oracle Financial Services Applications (component: Core (Spring Framework)).  Supported versions that are affected are 12.0.1, 12.0.3 and  12.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Private Banking. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9110V-12.0.1</ProductID>
            <ProductID>P-9110V-12.0.3</ProductID>
            <ProductID>P-9110V-12.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9110V-12.0.1</ProductID>
            <ProductID>P-9110V-12.0.3</ProductID>
            <ProductID>P-9110V-12.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="50" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="50" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure (Spring Framework)).  Supported versions that are affected are 8.0.2-8.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-8.0.2-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5680V-8.0.2-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="51" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="51" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Calculation Engine product of Oracle Insurance Applications (component: Core (Spring Framework)).  Supported versions that are affected are 9.7, 10.0, 10.1 and 10.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Calculation Engine.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Insurance Calculation Engine. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10837V-9.7</ProductID>
            <ProductID>P-10837V-10.0</ProductID>
            <ProductID>P-10837V-10.1</ProductID>
            <ProductID>P-10837V-10.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10837V-9.7</ProductID>
            <ProductID>P-10837V-10.0</ProductID>
            <ProductID>P-10837V-10.1</ProductID>
            <ProductID>P-10837V-10.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="52" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="52" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Policy Administration J2EE product of Oracle Insurance Applications (component: Core (Spring Framework)).  Supported versions that are affected are 10.0, 10.1, 10.2 and 11.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Policy Administration J2EE.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Insurance Policy Administration J2EE. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5279V-10.0</ProductID>
            <ProductID>P-5279V-10.1</ProductID>
            <ProductID>P-5279V-10.2</ProductID>
            <ProductID>P-5279V-11.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5279V-10.0</ProductID>
            <ProductID>P-5279V-10.1</ProductID>
            <ProductID>P-5279V-10.2</ProductID>
            <ProductID>P-5279V-11.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="53" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="53" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Rules Palette product of Oracle Insurance Applications (component: Core (Spring Framework)).  Supported versions that are affected are 10.0, 10.1, 10.2 and 11.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Rules Palette.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Insurance Rules Palette. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5288V-10.0</ProductID>
            <ProductID>P-5288V-10.1</ProductID>
            <ProductID>P-5288V-10.2</ProductID>
            <ProductID>P-5288V-11.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5288V-10.0</ProductID>
            <ProductID>P-5288V-10.1</ProductID>
            <ProductID>P-5288V-10.2</ProductID>
            <ProductID>P-5288V-11.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="54" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="54" Title="Details" Type="Details">Vulnerability in the MySQL Enterprise Monitor product of Oracle MySQL (component: Monitoring: General (Spring Framework)).  Supported versions that are affected are 4.0.9 and prior and  8.0.14 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise MySQL Enterprise Monitor.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Enterprise Monitor. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8480V-4.0.9 and prior</ProductID>
            <ProductID>P-8480V-8.0.14 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8480V-4.0.9 and prior</ProductID>
            <ProductID>P-8480V-8.0.14 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="55" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="55" Title="Details" Type="Details">Vulnerability in the Primavera Analytics product of Oracle Construction and Engineering (component: Admin (Spring Framework)).   The supported version that is affected is 18.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Analytics.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Primavera Analytics. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8577V-18.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8577V-18.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="56" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="56" Title="Details" Type="Details">Vulnerability in the Primavera Gateway product of Oracle Construction and Engineering (component: Admin (Spring Framework)).  Supported versions that are affected are 15.2, 16.2, 17.12 and 18.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Gateway.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Primavera Gateway. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10605V-15.2</ProductID>
            <ProductID>P-10605V-16.2</ProductID>
            <ProductID>P-10605V-17.12</ProductID>
            <ProductID>P-10605V-18.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10605V-15.2</ProductID>
            <ProductID>P-10605V-16.2</ProductID>
            <ProductID>P-10605V-17.12</ProductID>
            <ProductID>P-10605V-18.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="57" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="57" Title="Details" Type="Details">Vulnerability in the Oracle Retail Advanced Inventory Planning product of Oracle Retail Applications (component: Operations &amp; Maintenance (Spring Framework)).   The supported version that is affected is 15.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Advanced Inventory Planning.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Advanced Inventory Planning. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1785V-15.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1785V-15.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="58" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="58" Title="Details" Type="Details">Vulnerability in the Oracle Retail Financial Integration product of Oracle Retail Applications (component: PeopleSoft Integration Bugs (Spring Framework)).  Supported versions that are affected are 14.0, 14.1, 15.0 and 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Financial Integration.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Financial Integration. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10722V-14.0</ProductID>
            <ProductID>P-10722V-14.1</ProductID>
            <ProductID>P-10722V-15.0</ProductID>
            <ProductID>P-10722V-16.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10722V-14.0</ProductID>
            <ProductID>P-10722V-14.1</ProductID>
            <ProductID>P-10722V-15.0</ProductID>
            <ProductID>P-10722V-16.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="59" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="59" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced UI (Spring Framework)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebCenter Sites. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9617V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9617V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="60" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-15756</Title>
      <Notes>
         <Note Audience="All" Ordinal="60" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample apps (Spring Framework)).  Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-15756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0.0</ProductID>
            <ProductID>P-5242V-12.1.3.0.0</ProductID>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5242V-10.3.6.0.0</ProductID>
            <ProductID>P-5242V-12.1.3.0.0</ProductID>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="61" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-17197</Title>
      <Notes>
         <Note Audience="All" Ordinal="61" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Private Banking product of Oracle Financial Services Applications (component: Core (Apache Tika)).  Supported versions that are affected are 12.0.1, 12.0.3 and  12.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle FLEXCUBE Private Banking. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-17197</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9110V-12.0.1</ProductID>
            <ProductID>P-9110V-12.0.3</ProductID>
            <ProductID>P-9110V-12.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9110V-12.0.1</ProductID>
            <ProductID>P-9110V-12.0.3</ProductID>
            <ProductID>P-9110V-12.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="62" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-17197</Title>
      <Notes>
         <Note Audience="All" Ordinal="62" Title="Details" Type="Details">Vulnerability in the Primavera Unifier product of Oracle Construction and Engineering (component: Core (Apache Tika)).  Supported versions that are affected are 16.1, 16.2, 17.7-17.12 and 18.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Primavera Unifier. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-17197</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.1</ProductID>
            <ProductID>P-10354V-16.2</ProductID>
            <ProductID>P-10354V-17.7-17.12</ProductID>
            <ProductID>P-10354V-18.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10354V-16.1</ProductID>
            <ProductID>P-10354V-16.2</ProductID>
            <ProductID>P-10354V-17.7-17.12</ProductID>
            <ProductID>P-10354V-18.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="63" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-17960</Title>
      <Notes>
         <Note Audience="All" Ordinal="63" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Rich Text Editor (CKEditor)).  Supported versions that are affected are 8.55, 8.56 and  8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-17960</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="64" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="64" Title="Details" Type="Details">Vulnerability in the Oracle Banking Platform product of Oracle Financial Services Applications (component: Infrastructure (jackson-databind)).  Supported versions that are affected are 2.4.0-2.7.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Platform.  Successful attacks of this vulnerability can result in takeover of Oracle Banking Platform. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9178V-2.4.0-2.7.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9178V-2.4.0-2.7.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="65" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="65" Title="Details" Type="Details">Vulnerability in the Enterprise Manager for Virtualization product of Oracle Enterprise Manager (component: Plug-In Lifecycle (jackson-databind)).  Supported versions that are affected are 13.1, 13.2 and  13.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager for Virtualization.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager for Virtualization. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9586V-13.1</ProductID>
            <ProductID>P-9586V-13.2</ProductID>
            <ProductID>P-9586V-13.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9586V-13.1</ProductID>
            <ProductID>P-9586V-13.2</ProductID>
            <ProductID>P-9586V-13.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="66" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="66" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure (Jackson-databind)).  Supported versions that are affected are 8.0.2-8.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-8.0.2-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5680V-8.0.2-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="67" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="67" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Funds Transfer Pricing product of Oracle Financial Services Applications (component: Core (jackson-databind)).  Supported versions that are affected are 8.0.6-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Funds Transfer Pricing.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Funds Transfer Pricing. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5659V-8.0.6-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5659V-8.0.6-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="68" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="68" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Institutional Performance Analytics product of Oracle Financial Services Applications (component: Core (jackson-databind)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Institutional Performance Analytics.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Institutional Performance Analytics. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10215V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10215V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="69" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="69" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Price Creation and Discovery product of Oracle Financial Services Applications (component: Core (jackson-databind)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Price Creation and Discovery.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Price Creation and Discovery. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5749V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5749V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="70" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="70" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Profitability Management product of Oracle Financial Services Applications (component: Core (jackson-databind)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Profitability Management.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Profitability Management. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5658V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5658V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="71" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="71" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Retail Customer Analytics product of Oracle Financial Services Applications (component: Core (jackson-databind)).  Supported versions that are affected are 8.0.4-8.0.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Retail Customer Analytics.  Successful attacks of this vulnerability can result in takeover of Oracle Financial Services Retail Customer Analytics. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10214V-8.0.4-8.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10214V-8.0.4-8.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="72" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="72" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Allocation Manager for Enterprise Profitability product of Oracle Financial Services Applications (component: Core (jackson-databind)).   The supported version that is affected is 8.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Allocation Manager for Enterprise Profitability.  Successful attacks of this vulnerability can result in takeover of Oracle Insurance Allocation Manager for Enterprise Profitability. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13946V-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13946V-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="73" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="73" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Performance Insight product of Oracle Financial Services Applications (component: Core (jackson-databind)).   The supported version that is affected is 8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Performance Insight.  Successful attacks of this vulnerability can result in takeover of Oracle Insurance Performance Insight. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11257V-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11257V-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="74" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="74" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Monitoring and Diagnostics (jackson-databind)).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="75" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="75" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime (jackson-databind)).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="76" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="76" Title="Details" Type="Details">Vulnerability in the Primavera Gateway product of Oracle Construction and Engineering (component: Admin (jackson-databind)).  Supported versions that are affected are 15.2, 16.2, 17.12 and 18.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Gateway.  Successful attacks of this vulnerability can result in takeover of Primavera Gateway. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10605V-15.2</ProductID>
            <ProductID>P-10605V-16.2</ProductID>
            <ProductID>P-10605V-17.12</ProductID>
            <ProductID>P-10605V-18.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10605V-15.2</ProductID>
            <ProductID>P-10605V-16.2</ProductID>
            <ProductID>P-10605V-17.12</ProductID>
            <ProductID>P-10605V-18.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="77" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="77" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations (jackson-databind)).  Supported versions that are affected are 16.0, 17.0 and  18.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-16.0</ProductID>
            <ProductID>P-13388V-17.0</ProductID>
            <ProductID>P-13388V-18.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13388V-16.0</ProductID>
            <ProductID>P-13388V-17.0</ProductID>
            <ProductID>P-13388V-18.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="78" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-19362</Title>
      <Notes>
         <Note Audience="All" Ordinal="78" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (jackson-databind)).  Supported versions that are affected are 7.0, 7.1, 15.0, 16.0, 17.0 and  18.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Xstore Point of Service. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-19362</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-7.0</ProductID>
            <ProductID>P-11513V-7.1</ProductID>
            <ProductID>P-11513V-15.0</ProductID>
            <ProductID>P-11513V-16.0</ProductID>
            <ProductID>P-11513V-17.0</ProductID>
            <ProductID>P-11513V-18.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11513V-7.0</ProductID>
            <ProductID>P-11513V-7.1</ProductID>
            <ProductID>P-11513V-15.0</ProductID>
            <ProductID>P-11513V-16.0</ProductID>
            <ProductID>P-11513V-17.0</ProductID>
            <ProductID>P-11513V-18.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="79" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-2883</Title>
      <Notes>
         <Note Audience="All" Ordinal="79" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Office product of Oracle Retail Applications (component: Internal Operations).  Supported versions that are affected are 7.0 and  7.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Xstore Office.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Retail Xstore Office accessible data as well as  unauthorized read access to a subset of Oracle Retail Xstore Office accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Xstore Office. CVSS 3.0 Base Score 5.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-2883</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11560V-7.0</ProductID>
            <ProductID>P-11560V-7.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11560V-7.0</ProductID>
            <ProductID>P-11560V-7.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="80" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3111</Title>
      <Notes>
         <Note Audience="All" Ordinal="80" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Office product of Oracle Retail Applications (component: Internal Operations).   The supported version that is affected is 7.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Office.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Xstore Office accessible data as well as  unauthorized update, insert or delete access to some of Oracle Retail Xstore Office accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Xstore Office. CVSS 3.0 Base Score 7.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3111</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11560V-7.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11560V-7.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="81" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3315</Title>
      <Notes>
         <Note Audience="All" Ordinal="81" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Customer).  Supported versions that are affected are 16.0 and  17.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  While the vulnerability is in Oracle Retail Customer Management and Segmentation Foundation, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Retail Customer Management and Segmentation Foundation accessible data as well as  unauthorized access to critical data or complete access to all Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3315</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-16.0</ProductID>
            <ProductID>P-13388V-17.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13388V-16.0</ProductID>
            <ProductID>P-13388V-17.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="82" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-3316</Title>
      <Notes>
         <Note Audience="All" Ordinal="82" Title="Details" Type="Details">Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Segment).  Supported versions that are affected are 16.0 and  17.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Customer Management and Segmentation Foundation accessible data as well as  unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.0 Base Score 7.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-3316</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13388V-16.0</ProductID>
            <ProductID>P-13388V-17.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.6</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13388V-16.0</ProductID>
            <ProductID>P-13388V-17.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="83" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-7489</Title>
      <Notes>
         <Note Audience="All" Ordinal="83" Title="Details" Type="Details">Vulnerability in the Oracle Global Lifecycle Management OPatchAuto product of Oracle Global Lifecycle Management (component: OPatch Auto Binary (jackson-databind)).   The supported version that is affected is Prior to 12.2.0.1.14. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Global Lifecycle Management OPatchAuto executes to compromise Oracle Global Lifecycle Management OPatchAuto.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Global Lifecycle Management OPatchAuto, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Global Lifecycle Management OPatchAuto. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-7489</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12752V-Prior to 12.2.0.1.14</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.2</BaseScore>
            <Vector>AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-12752V-Prior to 12.2.0.1.14</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="84" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-8013</Title>
      <Notes>
         <Note Audience="All" Ordinal="84" Title="Details" Type="Details">Vulnerability in the Oracle Communications Application Session Controller product of Oracle Communications (component: Security (Apache Batik)).  Supported versions that are affected are 3.7.1 and 3.8.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Application Session Controller.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Communications Application Session Controller accessible data as well as  unauthorized read access to a subset of Oracle Communications Application Session Controller accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Application Session Controller. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-8013</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10769V-3.7.1</ProductID>
            <ProductID>P-10769V-3.8.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10769V-3.7.1</ProductID>
            <ProductID>P-10769V-3.8.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="85" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-8013</Title>
      <Notes>
         <Note Audience="All" Ordinal="85" Title="Details" Type="Details">Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Third Party Tools (Apache Batik)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data as well as  unauthorized read access to a subset of Oracle WebCenter Sites accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-8013</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9617V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9617V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="86" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-8039</Title>
      <Notes>
         <Note Audience="All" Ordinal="86" Title="Details" Type="Details">Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: Security (Apache cxf)).  Supported versions that are affected are 8.0, 8.1 and 8.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR).  Successful attacks of this vulnerability can result in takeover of Oracle Communications Diameter Signaling Router (DSR). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-8039</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10899V-8.0</ProductID>
            <ProductID>P-10899V-8.1</ProductID>
            <ProductID>P-10899V-8.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10899V-8.0</ProductID>
            <ProductID>P-10899V-8.1</ProductID>
            <ProductID>P-10899V-8.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="87" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-8039</Title>
      <Notes>
         <Note Audience="All" Ordinal="87" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Connector Framework (Apache CXF)).  Supported versions that are affected are 12.1.0.5.0, 13.2.0.0.0 and  13.3.0.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Base Platform.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager Base Platform. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-8039</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-12.1.0.5.0</ProductID>
            <ProductID>P-1370V-13.2.0.0.0</ProductID>
            <ProductID>P-1370V-13.3.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1370V-12.1.0.5.0</ProductID>
            <ProductID>P-1370V-13.2.0.0.0</ProductID>
            <ProductID>P-1370V-13.3.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="88" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-8039</Title>
      <Notes>
         <Note Audience="All" Ordinal="88" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Private Banking product of Oracle Financial Services Applications (component: Core (cxf)).  Supported versions that are affected are 12.0.1, 12.0.3 and  12.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking.  Successful attacks of this vulnerability can result in takeover of Oracle FLEXCUBE Private Banking. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-8039</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9110V-12.0.1</ProductID>
            <ProductID>P-9110V-12.0.3</ProductID>
            <ProductID>P-9110V-12.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9110V-12.0.1</ProductID>
            <ProductID>P-9110V-12.0.3</ProductID>
            <ProductID>P-9110V-12.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="89" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2018-8039</Title>
      <Notes>
         <Note Audience="All" Ordinal="89" Title="Details" Type="Details">Vulnerability in the Oracle Retail Order Broker product of Oracle Retail Applications (component: Order Broker Foundation (Apache CXF)).  Supported versions that are affected are 5.2 and  15.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Order Broker.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Order Broker. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2018-8039</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11520V-5.2</ProductID>
            <ProductID>P-11520V-15.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11520V-5.2</ProductID>
            <ProductID>P-11520V-15.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="90" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0190</Title>
      <Notes>
         <Note Audience="All" Ordinal="90" Title="Details" Type="Details">Vulnerability in the Instantis EnterpriseTrack product of Oracle Construction and Engineering (component: Core (Apache HTTP Server)).  Supported versions that are affected are 17.1, 17.2 and 17.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Instantis EnterpriseTrack.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Instantis EnterpriseTrack. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0190</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10563V-17.1</ProductID>
            <ProductID>P-10563V-17.2</ProductID>
            <ProductID>P-10563V-17.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10563V-17.1</ProductID>
            <ProductID>P-10563V-17.2</ProductID>
            <ProductID>P-10563V-17.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="91" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0190</Title>
      <Notes>
         <Note Audience="All" Ordinal="91" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xstore Office (Apache HTTP Server)).  Supported versions that are affected are 7.0 and  7.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Retail Xstore Point of Service. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0190</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-7.0</ProductID>
            <ProductID>P-11513V-7.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11513V-7.0</ProductID>
            <ProductID>P-11513V-7.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="92" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0192</Title>
      <Notes>
         <Note Audience="All" Ordinal="92" Title="Details" Type="Details">Vulnerability in the Primavera Unifier product of Oracle Construction and Engineering (component: Core (solr)).  Supported versions that are affected are 16.1, 16.2, 17.7-17.12 and 18.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier.  Successful attacks of this vulnerability can result in takeover of Primavera Unifier. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0192</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10354V-16.1</ProductID>
            <ProductID>P-10354V-16.2</ProductID>
            <ProductID>P-10354V-17.7-17.12</ProductID>
            <ProductID>P-10354V-18.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10354V-16.1</ProductID>
            <ProductID>P-10354V-16.2</ProductID>
            <ProductID>P-10354V-17.7-17.12</ProductID>
            <ProductID>P-10354V-18.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="93" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0199</Title>
      <Notes>
         <Note Audience="All" Ordinal="93" Title="Details" Type="Details">Vulnerability in the Instantis EnterpriseTrack product of Oracle Construction and Engineering (component: Core (Tomcat)).  Supported versions that are affected are 17.1, 17.2 and 17.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Instantis EnterpriseTrack.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Instantis EnterpriseTrack. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0199</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10563V-17.1</ProductID>
            <ProductID>P-10563V-17.2</ProductID>
            <ProductID>P-10563V-17.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10563V-17.1</ProductID>
            <ProductID>P-10563V-17.2</ProductID>
            <ProductID>P-10563V-17.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="94" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0211</Title>
      <Notes>
         <Note Audience="All" Ordinal="94" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center product of Oracle Enterprise Manager (component: Compliance Test Suite (Apache HTTP Server)).  Supported versions that are affected are 12.3.3 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Enterprise Manager Ops Center executes to compromise Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager Ops Center. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0211</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.3.3</ProductID>
            <ProductID>P-9835V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9835V-12.3.3</ProductID>
            <ProductID>P-9835V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="95" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0211</Title>
      <Notes>
         <Note Audience="All" Ordinal="95" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener (Apache httpd)).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle HTTP Server executes to compromise Oracle HTTP Server.  Successful attacks of this vulnerability can result in takeover of Oracle HTTP Server. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0211</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1042V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="96" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0211</Title>
      <Notes>
         <Note Audience="All" Ordinal="96" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Xenvironment (Apache HTTP Server)).  Supported versions that are affected are 7.0 and  7.1. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Retail Xstore Point of Service executes to compromise Oracle Retail Xstore Point of Service.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Xstore Point of Service. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0211</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11513V-7.0</ProductID>
            <ProductID>P-11513V-7.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11513V-7.0</ProductID>
            <ProductID>P-11513V-7.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="97" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0222</Title>
      <Notes>
         <Note Audience="All" Ordinal="97" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Valid Session (Apache ActiveMQ)).  Supported versions that are affected are 12.1.0.5.0, 13.2.0.0.0 and  13.3.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Manager Base Platform.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Enterprise Manager Base Platform. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0222</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-12.1.0.5.0</ProductID>
            <ProductID>P-1370V-13.2.0.0.0</ProductID>
            <ProductID>P-1370V-13.3.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1370V-12.1.0.5.0</ProductID>
            <ProductID>P-1370V-13.2.0.0.0</ProductID>
            <ProductID>P-1370V-13.3.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="98" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0222</Title>
      <Notes>
         <Note Audience="All" Ordinal="98" Title="Details" Type="Details">Vulnerability in the Oracle Enterprise Repository product of Oracle Fusion Middleware (component: Security Subsystem - 12c (Apache ActiveMQ)).   The supported version that is affected is 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Repository.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Enterprise Repository. CVSS 3.0 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0222</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5326V-12.1.3.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5326V-12.1.3.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="99" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0232</Title>
      <Notes>
         <Note Audience="All" Ordinal="99" Title="Details" Type="Details">Vulnerability in the Oracle Retail Order Broker product of Oracle Retail Applications (component: Upgrade Install (Apache Tomcat)).  Supported versions that are affected are 5.2 and  15.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Order Broker.  Successful attacks of this vulnerability can result in takeover of Oracle Retail Order Broker. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0232</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11520V-5.2</ProductID>
            <ProductID>P-11520V-15.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11520V-5.2</ProductID>
            <ProductID>P-11520V-15.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="100" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-0232</Title>
      <Notes>
         <Note Audience="All" Ordinal="100" Title="Details" Type="Details">Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Install (Apache Tomcat)).   The supported version that is affected is 6.3.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Transportation Management.  Successful attacks of this vulnerability can result in takeover of Oracle Transportation Management. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-0232</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1991V-6.3.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1991V-6.3.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="101" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="101" Title="Details" Type="Details">Vulnerability in the Oracle Banking Platform product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 2.4.0-2.7.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Platform.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Platform, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Banking Platform accessible data as well as  unauthorized read access to a subset of Oracle Banking Platform accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9178V-2.4.0-2.7.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9178V-2.4.0-2.7.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="102" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="102" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services - Regulatory Reporting for Reserve Bank of India - Lombard Risk Integration Pack product of Oracle Financial Services Applications (component: UI (jQuery)).   The supported version that is affected is 8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services - Regulatory Reporting for Reserve Bank of India - Lombard Risk Integration Pack.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services - Regulatory Reporting for Reserve Bank of India - Lombard Risk Integration Pack, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services - Regulatory Reporting for Reserve Bank of India - Lombard Risk Integration Pack accessible data as well as  unauthorized read access to a subset of Oracle Financial Services - Regulatory Reporting for Reserve Bank of India - Lombard Risk Integration Pack accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12586V-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-12586V-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="103" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="103" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services - Regulatory Reporting for US Federal Reserve - Lombard Risk Integration Pack product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services - Regulatory Reporting for US Federal Reserve - Lombard Risk Integration Pack.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services - Regulatory Reporting for US Federal Reserve - Lombard Risk Integration Pack, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services - Regulatory Reporting for US Federal Reserve - Lombard Risk Integration Pack accessible data as well as  unauthorized read access to a subset of Oracle Financial Services - Regulatory Reporting for US Federal Reserve - Lombard Risk Integration Pack accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12587V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-12587V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="104" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="104" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure (jQuery)).  Supported versions that are affected are 7.3.3-7.3.5 and  8.0.2-8.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Analytical Applications Infrastructure, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Analytical Applications Infrastructure accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-7.3.3-7.3.5</ProductID>
            <ProductID>P-5680V-8.0.2-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5680V-7.3.3-7.3.5</ProductID>
            <ProductID>P-5680V-8.0.2-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="105" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="105" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Reconciliation Framework product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Reconciliation Framework.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Analytical Applications Reconciliation Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Analytical Applications Reconciliation Framework accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Analytical Applications Reconciliation Framework accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5748V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5748V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="106" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="106" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Asset Liability Management product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Asset Liability Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Asset Liability Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Asset Liability Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Asset Liability Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5662V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5662V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="107" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="107" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Basel Regulatory Capital Basic product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Basel Regulatory Capital Basic.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Basel Regulatory Capital Basic, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Basel Regulatory Capital Basic accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Basel Regulatory Capital Basic accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9612V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9612V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="108" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="108" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Basel Regulatory Capital Internal Ratings Based Approach accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9450V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9450V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="109" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="109" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Data Foundation product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Data Foundation.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Data Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Data Foundation accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Data Foundation accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9180V-8.0.4-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9180V-8.0.4-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="110" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="110" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Data Integration Hub product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.5-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Data Integration Hub.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Data Integration Hub, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Data Integration Hub accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Data Integration Hub accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11289V-8.0.5-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11289V-8.0.5-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="111" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="111" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Funds Transfer Pricing product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Funds Transfer Pricing.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Funds Transfer Pricing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Funds Transfer Pricing accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Funds Transfer Pricing accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5659V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5659V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="112" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="112" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Hedge Management and IFRS Valuations product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Hedge Management and IFRS Valuations.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Hedge Management and IFRS Valuations, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Hedge Management and IFRS Valuations accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Hedge Management and IFRS Valuations accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9332V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9332V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="113" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="113" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Institutional Performance Analytics product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Institutional Performance Analytics.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Institutional Performance Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Institutional Performance Analytics accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Institutional Performance Analytics accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10215V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10215V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="114" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="114" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Liquidity Risk Management product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.1, 8.0.2, 8.0.4, 8.0.5 and 8.0.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Liquidity Risk Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Liquidity Risk Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Liquidity Risk Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Liquidity Risk Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9096V-8.0.1</ProductID>
            <ProductID>P-9096V-8.0.2</ProductID>
            <ProductID>P-9096V-8.0.4</ProductID>
            <ProductID>P-9096V-8.0.5</ProductID>
            <ProductID>P-9096V-8.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9096V-8.0.1</ProductID>
            <ProductID>P-9096V-8.0.2</ProductID>
            <ProductID>P-9096V-8.0.4</ProductID>
            <ProductID>P-9096V-8.0.5</ProductID>
            <ProductID>P-9096V-8.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="115" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="115" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Liquidity Risk Measurement and Management product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.7 and 8.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Liquidity Risk Measurement and Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Liquidity Risk Measurement and Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Liquidity Risk Measurement and Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Liquidity Risk Measurement and Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13797V-8.0.7</ProductID>
            <ProductID>P-13797V-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13797V-8.0.7</ProductID>
            <ProductID>P-13797V-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="116" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="116" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Loan Loss Forecasting and Provisioning product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.2-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Loan Loss Forecasting and Provisioning.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Loan Loss Forecasting and Provisioning, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Loan Loss Forecasting and Provisioning accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Loan Loss Forecasting and Provisioning accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9474V-8.0.2-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9474V-8.0.2-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="117" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="117" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Market Risk Measurement and Management product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.5, 8.0.6 and 8.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Market Risk Measurement and Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Market Risk Measurement and Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Market Risk Measurement and Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Market Risk Measurement and Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13111V-8.0.5</ProductID>
            <ProductID>P-13111V-8.0.6</ProductID>
            <ProductID>P-13111V-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13111V-8.0.5</ProductID>
            <ProductID>P-13111V-8.0.6</ProductID>
            <ProductID>P-13111V-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="118" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="118" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Price Creation and Discovery product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Price Creation and Discovery.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Price Creation and Discovery, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Price Creation and Discovery accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Price Creation and Discovery accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5749V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5749V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="119" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="119" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Profitability Management product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Profitability Management.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Profitability Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Profitability Management accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Profitability Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5658V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5658V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="120" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="120" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Regulatory Reporting for European Banking Authority product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.6 and 8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Regulatory Reporting for European Banking Authority.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Regulatory Reporting for European Banking Authority, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Regulatory Reporting for European Banking Authority accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Regulatory Reporting for European Banking Authority accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13147V-8.0.6</ProductID>
            <ProductID>P-13147V-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13147V-8.0.6</ProductID>
            <ProductID>P-13147V-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="121" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="121" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Regulatory Reporting for European Banking Authority - Integration Pack for Lombard Risk product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.6 and 8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Regulatory Reporting for European Banking Authority - Integration Pack for Lombard Risk.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Regulatory Reporting for European Banking Authority - Integration Pack for Lombard Risk, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Regulatory Reporting for European Banking Authority - Integration Pack for Lombard Risk accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Regulatory Reporting for European Banking Authority - Integration Pack for Lombard Risk accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13148V-8.0.6</ProductID>
            <ProductID>P-13148V-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13148V-8.0.6</ProductID>
            <ProductID>P-13148V-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="122" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="122" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Regulatory Reporting for US Federal Reserve product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Regulatory Reporting for US Federal Reserve.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Regulatory Reporting for US Federal Reserve, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Regulatory Reporting for US Federal Reserve accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Regulatory Reporting for US Federal Reserve accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13080V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13080V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="123" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="123" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Retail Customer Analytics product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Retail Customer Analytics.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Retail Customer Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Retail Customer Analytics accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Retail Customer Analytics accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10214V-8.0.4-8.0.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10214V-8.0.4-8.0.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="124" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="124" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Core (jQuery)).  Supported versions that are affected are 2.4.0.0 and 2.4.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Revenue Management and Billing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Revenue Management and Billing accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Revenue Management and Billing accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5322V-2.4.0.0</ProductID>
            <ProductID>P-5322V-2.4.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5322V-2.4.0.0</ProductID>
            <ProductID>P-5322V-2.4.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="125" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="125" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Guest Access product of Oracle Hospitality Applications (component: Base (jQuery)).  Supported versions that are affected are 4.2 and 4.2.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Guest Access.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Guest Access, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Hospitality Guest Access accessible data as well as  unauthorized read access to a subset of Oracle Hospitality Guest Access accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12617V-4.2</ProductID>
            <ProductID>P-12617V-4.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-12617V-4.2</ProductID>
            <ProductID>P-12617V-4.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="126" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="126" Title="Details" Type="Details">Vulnerability in the Oracle Insurance IFRS 17 Analyzer product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.6 and 8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance IFRS 17 Analyzer.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Insurance IFRS 17 Analyzer, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Insurance IFRS 17 Analyzer accessible data as well as  unauthorized read access to a subset of Oracle Insurance IFRS 17 Analyzer accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13809V-8.0.6</ProductID>
            <ProductID>P-13809V-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13809V-8.0.6</ProductID>
            <ProductID>P-13809V-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="127" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="127" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Allocation Manager for Enterprise Profitability product of Oracle Financial Services Applications (component: UI (jQuery)).   The supported version that is affected is 8.0.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Allocation Manager for Enterprise Profitability.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Insurance Allocation Manager for Enterprise Profitability, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Insurance Allocation Manager for Enterprise Profitability accessible data as well as  unauthorized read access to a subset of Oracle Insurance Allocation Manager for Enterprise Profitability accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13946V-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13946V-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="128" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="128" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Data Foundation product of Oracle Financial Services Applications (component: UI (jQuery)).  Supported versions that are affected are 8.0.4-8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Data Foundation.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Insurance Data Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Insurance Data Foundation accessible data as well as  unauthorized read access to a subset of Oracle Insurance Data Foundation accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9755V-8.0.4-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9755V-8.0.4-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="129" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="129" Title="Details" Type="Details">Vulnerability in the Oracle Insurance Performance Insight product of Oracle Financial Services Applications (component: UI (jQuery)).   The supported version that is affected is 8.0.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Insurance Performance Insight.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Insurance Performance Insight, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Insurance Performance Insight accessible data as well as  unauthorized read access to a subset of Oracle Insurance Performance Insight accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11257V-8.0.7</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11257V-8.0.7</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="130" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-11358</Title>
      <Notes>
         <Note Audience="All" Ordinal="130" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Mobile Application Platform (jQuery)).  Supported versions that are affected are 8.55, 8.56 and  8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-11358</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="131" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1543</Title>
      <Notes>
         <Note Audience="All" Ordinal="131" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core (OpenSSL)).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as  unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1543</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.4</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="132" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1559</Title>
      <Notes>
         <Note Audience="All" Ordinal="132" Title="Details" Type="Details">Vulnerability in the Oracle Endeca Server product of Oracle Fusion Middleware (component: Product Code (OpenSSL)).   The supported version that is affected is 7.7.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Endeca Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Endeca Server accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1559</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10217V-7.7.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10217V-7.7.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="133" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1559</Title>
      <Notes>
         <Note Audience="All" Ordinal="133" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Discovery Framework (OpenSSL)).  Supported versions that are affected are 12.1.0.5.0, 13.2.0.0.0 and  13.3.0.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Enterprise Manager Base Platform.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1559</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1370V-12.1.0.5.0</ProductID>
            <ProductID>P-1370V-13.2.0.0.0</ProductID>
            <ProductID>P-1370V-13.3.0.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1370V-12.1.0.5.0</ProductID>
            <ProductID>P-1370V-13.2.0.0.0</ProductID>
            <ProductID>P-1370V-13.3.0.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="134" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1559</Title>
      <Notes>
         <Note Audience="All" Ordinal="134" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center product of Oracle Enterprise Manager (component: Networking (OpenSSL)).  Supported versions that are affected are 12.3.3 and 12.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Enterprise Manager Ops Center accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1559</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.3.3</ProductID>
            <ProductID>P-9835V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9835V-12.3.3</ProductID>
            <ProductID>P-9835V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="135" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1559</Title>
      <Notes>
         <Note Audience="All" Ordinal="135" Title="Details" Type="Details">Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Enterprise Infrastructure SEC (OpenSSL)).   The supported version that is affected is 9.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via JDENET to compromise JD Edwards EnterpriseOne Tools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1559</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4781V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4781V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="136" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1559</Title>
      <Notes>
         <Note Audience="All" Ordinal="136" Title="Details" Type="Details">Vulnerability in the JD Edwards World Security product of Oracle JD Edwards (component: Security Vulnerability (OpenSSL)).  Supported versions that are affected are A9.3, A9.3.1 and  A9.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise JD Edwards World Security.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all JD Edwards World Security accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1559</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4839V-A9.3</ProductID>
            <ProductID>P-4839V-A9.3.1</ProductID>
            <ProductID>P-4839V-A9.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4839V-A9.3</ProductID>
            <ProductID>P-4839V-A9.3.1</ProductID>
            <ProductID>P-4839V-A9.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="137" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1559</Title>
      <Notes>
         <Note Audience="All" Ordinal="137" Title="Details" Type="Details">Vulnerability in the MySQL Workbench product of Oracle MySQL (component: MySQL Workbench (OpenSSL)).  Supported versions that are affected are 8.0.16 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via MySQL Workbench to compromise MySQL Workbench.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all MySQL Workbench accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1559</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4627V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4627V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="138" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1559</Title>
      <Notes>
         <Note Audience="All" Ordinal="138" Title="Details" Type="Details">Vulnerability in the Services Tools Bundle product of Oracle Support Tools (component: Utilities (OpenSSL)).   The supported version that is affected is 19.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Services Tools Bundle.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Services Tools Bundle accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1559</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1330V-19.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1330V-19.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="139" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-1559</Title>
      <Notes>
         <Note Audience="All" Ordinal="139" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security (OpenSSL)).  Supported versions that are affected are 8.55, 8.56 and  8.57. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-1559</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="140" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2484</Title>
      <Notes>
         <Note Audience="All" Ordinal="140" Title="Details" Type="Details">Vulnerability in the Application Express component of Oracle Database Server.  Supported versions that are affected are 5.1 and  18.2. Easily exploitable vulnerability allows low privileged attacker having Valid Account privilege with network access via HTTP to compromise Application Express.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Application Express, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Application Express accessible data as well as  unauthorized read access to a subset of Application Express accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2484</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1348V-5.1</ProductID>
            <ProductID>P-1348V-18.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1348V-5.1</ProductID>
            <ProductID>P-1348V-18.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="141" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2561</Title>
      <Notes>
         <Note Audience="All" Ordinal="141" Title="Details" Type="Details">Vulnerability in the Oracle Retail Xstore Office product of Oracle Retail Applications (component: Internal Operations).  Supported versions that are affected are 7.0 and  7.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Office.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Retail Xstore Office accessible data as well as  unauthorized update, insert or delete access to some of Oracle Retail Xstore Office accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2561</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11560V-7.0</ProductID>
            <ProductID>P-11560V-7.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11560V-7.0</ProductID>
            <ProductID>P-11560V-7.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="142" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2569</Title>
      <Notes>
         <Note Audience="All" Ordinal="142" Title="Details" Type="Details">Vulnerability in the Core RDBMS component of Oracle Database Server.  Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Difficult to exploit vulnerability allows high privileged attacker having Local Logon privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Core RDBMS accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2569</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.0</BaseScore>
            <Vector>AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="143" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2599</Title>
      <Notes>
         <Note Audience="All" Ordinal="143" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PT PeopleTools product of Oracle PeopleSoft (component: Pagelet Wizard).  Supported versions that are affected are 8.55, 8.56 and  8.57. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PT PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all PeopleSoft Enterprise PT PeopleTools accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2599</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="144" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2666</Title>
      <Notes>
         <Note Audience="All" Ordinal="144" Title="Details" Type="Details">Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as  unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2666</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1379V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-1379V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1379V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-1379V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="145" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2668</Title>
      <Notes>
         <Note Audience="All" Ordinal="145" Title="Details" Type="Details">Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as  unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2668</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1379V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-1379V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1379V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-1379V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="146" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2672</Title>
      <Notes>
         <Note Audience="All" Ordinal="146" Title="Details" Type="Details">Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as  unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2672</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1379V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-1379V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1379V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-1379V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="147" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2725</Title>
      <Notes>
         <Note Audience="All" Ordinal="147" Title="Details" Type="Details">Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Application Server (Oracle WebLogic Server)).  Supported versions that are affected are 9.3.3, 9.3.4 and  9.3.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM.  Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2725</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4461V-9.3.3</ProductID>
            <ProductID>P-4461V-9.3.4</ProductID>
            <ProductID>P-4461V-9.3.5</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4461V-9.3.3</ProductID>
            <ProductID>P-4461V-9.3.4</ProductID>
            <ProductID>P-4461V-9.3.5</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="148" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2725</Title>
      <Notes>
         <Note Audience="All" Ordinal="148" Title="Details" Type="Details">Vulnerability in the StorageTek Tape Analytics SW Tool product of Oracle Systems (component: Application Server (WebLogic)).   The supported version that is affected is 2.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise StorageTek Tape Analytics SW Tool.  Successful attacks of this vulnerability can result in takeover of StorageTek Tape Analytics SW Tool. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2725</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10085V-2.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10085V-2.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="149" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2725</Title>
      <Notes>
         <Note Audience="All" Ordinal="149" Title="Details" Type="Details">Vulnerability in the Tape Virtual Storage Manager GUI product of Oracle Systems (component: Application Server (WebLogic)).   The supported version that is affected is 6.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Tape Virtual Storage Manager GUI.  Successful attacks of this vulnerability can result in takeover of Tape Virtual Storage Manager GUI. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2725</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10118V-6.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10118V-6.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="150" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2727</Title>
      <Notes>
         <Note Audience="All" Ordinal="150" Title="Details" Type="Details">Vulnerability in the Oracle Application Testing Suite product of Oracle Enterprise Manager (component: Load Testing for Web Apps).   The supported version that is affected is 13.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Testing Suite.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Application Testing Suite accessible data as well as  unauthorized read access to a subset of Oracle Application Testing Suite accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Application Testing Suite. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2727</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4622V-13.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4622V-13.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="151" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2728</Title>
      <Notes>
         <Note Audience="All" Ordinal="151" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center product of Oracle Enterprise Manager (component: Networking).  Supported versions that are affected are 12.3.3 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Enterprise Manager Ops Center accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2728</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.3.3</ProductID>
            <ProductID>P-9835V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9835V-12.3.3</ProductID>
            <ProductID>P-9835V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="152" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2729</Title>
      <Notes>
         <Note Audience="All" Ordinal="152" Title="Details" Type="Details">Vulnerability in the Oracle Communications Converged Application Server product of Oracle Communications (component: Security (Oracle WebLogic Server)).  Supported versions that are affected are 5.1, 7.0 and  7.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Converged Application Server.  Successful attacks of this vulnerability can result in takeover of Oracle Communications Converged Application Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2729</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5382V-5.1</ProductID>
            <ProductID>P-5382V-7.0</ProductID>
            <ProductID>P-5382V-7.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5382V-5.1</ProductID>
            <ProductID>P-5382V-7.0</ProductID>
            <ProductID>P-5382V-7.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="153" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2729</Title>
      <Notes>
         <Note Audience="All" Ordinal="153" Title="Details" Type="Details">Vulnerability in the StorageTek Tape Analytics SW Tool product of Oracle Systems (component: Application Server (WebLogic)).   The supported version that is affected is 2.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise StorageTek Tape Analytics SW Tool.  Successful attacks of this vulnerability can result in takeover of StorageTek Tape Analytics SW Tool. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2729</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10085V-2.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10085V-2.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="154" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2730</Title>
      <Notes>
         <Note Audience="All" Ordinal="154" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 5.6.44 and prior and  5.7.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 2.7 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2730</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.18 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.7</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.18 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="155" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2731</Title>
      <Notes>
         <Note Audience="All" Ordinal="155" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 5.7.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2731</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.23 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.23 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="156" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2732</Title>
      <Notes>
         <Note Audience="All" Ordinal="156" Title="Details" Type="Details">Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: Product Security).   The supported version that is affected is 7.3.1.5.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Demantra Demand Management accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2732</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2100V-7.3.1.5.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2100V-7.3.1.5.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="157" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2733</Title>
      <Notes>
         <Note Audience="All" Ordinal="157" Title="Details" Type="Details">Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: Product Security).   The supported version that is affected is 7.3.1.5.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Demantra Demand Management.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Demantra Demand Management accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2733</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2100V-7.3.1.5.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2100V-7.3.1.5.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="158" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2735</Title>
      <Notes>
         <Note Audience="All" Ordinal="158" Title="Details" Type="Details">Vulnerability in the Oracle Hyperion Workspace product of Oracle Hyperion (component: UI and Visualization).   The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hyperion Workspace.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Hyperion Workspace accessible data. CVSS 3.0 Base Score 2.4 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2735</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4361V-11.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.4</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4361V-11.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="159" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2736</Title>
      <Notes>
         <Note Audience="All" Ordinal="159" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Investor Servicing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2736</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="160" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2737</Title>
      <Notes>
         <Note Audience="All" Ordinal="160" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server : Pluggable Auth).  Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2737</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="161" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2738</Title>
      <Notes>
         <Note Audience="All" Ordinal="161" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server : Compiling).  Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and  8.0.16 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2738</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.1</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="162" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2739</Title>
      <Notes>
         <Note Audience="All" Ordinal="162" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2739</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.1</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="163" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2740</Title>
      <Notes>
         <Note Audience="All" Ordinal="163" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: XML).  Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2740</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="164" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2741</Title>
      <Notes>
         <Note Audience="All" Ordinal="164" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Log).  Supported versions that are affected are 5.7.26 and prior and  8.0.16 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2741</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="165" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2742</Title>
      <Notes>
         <Note Audience="All" Ordinal="165" Title="Details" Type="Details">Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Web Service API).   The supported version that is affected is 11.1.1.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher.  While the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as  unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2742</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="166" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2743</Title>
      <Notes>
         <Note Audience="All" Ordinal="166" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles).  Supported versions that are affected are 8.0.12 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2743</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.12 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.12 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="167" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2744</Title>
      <Notes>
         <Note Audience="All" Ordinal="167" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1-12.0.3, 12.1.0-12.4.0 and 14.0.0-14.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2744</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="168" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2745</Title>
      <Notes>
         <Note Audience="All" Ordinal="168" Title="Details" Type="Details">Vulnerability in the Java SE product of Oracle Java SE (component: Security).  Supported versions that are affected are Java SE: 7u221, 8u212 and  11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Java SE accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2745</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.1</BaseScore>
            <Vector>AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="169" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2746</Title>
      <Notes>
         <Note Audience="All" Ordinal="169" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary).  Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2746</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.12 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.12 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="170" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2747</Title>
      <Notes>
         <Note Audience="All" Ordinal="170" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS).  Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2747</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.12 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.12 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="171" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2748</Title>
      <Notes>
         <Note Audience="All" Ordinal="171" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PT PeopleTools product of Oracle PeopleSoft (component: Application Server).  Supported versions that are affected are 8.55, 8.56 and  8.57. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PT PeopleTools.  While the vulnerability is in PeopleSoft Enterprise PT PeopleTools, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PT PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PT PeopleTools accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2748</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="172" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2749</Title>
      <Notes>
         <Note Audience="All" Ordinal="172" Title="Details" Type="Details">Vulnerability in the Java VM component of Oracle Database Server.  Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and  19c. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise Java VM.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Java VM accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java VM. CVSS 3.0 Base Score 6.8 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2749</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
            <ProductID>P-5V-18c</ProductID>
            <ProductID>P-5V-19c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.8</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5V-11.2.0.4</ProductID>
            <ProductID>P-5V-12.1.0.2</ProductID>
            <ProductID>P-5V-12.2.0.1</ProductID>
            <ProductID>P-5V-18c</ProductID>
            <ProductID>P-5V-19c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="173" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2750</Title>
      <Notes>
         <Note Audience="All" Ordinal="173" Title="Details" Type="Details">Vulnerability in the MICROS Retail-J product of Oracle Retail Applications (component: Internal Operations).  Supported versions that are affected are 12.1.0, 12.1.1, 12.1.2 and  13.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise MICROS Retail-J.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all MICROS Retail-J accessible data as well as  unauthorized update, insert or delete access to some of MICROS Retail-J accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MICROS Retail-J. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2750</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11567V-12.1.0</ProductID>
            <ProductID>P-11567V-12.1.1</ProductID>
            <ProductID>P-11567V-12.1.2</ProductID>
            <ProductID>P-11567V-13.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11567V-12.1.0</ProductID>
            <ProductID>P-11567V-12.1.1</ProductID>
            <ProductID>P-11567V-12.1.2</ProductID>
            <ProductID>P-11567V-13.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="174" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2751</Title>
      <Notes>
         <Note Audience="All" Ordinal="174" Title="Details" Type="Details">Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OHS Config MBeans).  Supported versions that are affected are 12.1.3.0.0 and 12.2.1.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle HTTP Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle HTTP Server accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2751</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1042V-12.1.3.0.0</ProductID>
            <ProductID>P-1042V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.9</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1042V-12.1.3.0.0</ProductID>
            <ProductID>P-1042V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="175" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2752</Title>
      <Notes>
         <Note Audience="All" Ordinal="175" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2752</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="176" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2753</Title>
      <Notes>
         <Note Audience="All" Ordinal="176" Title="Details" Type="Details">Vulnerability in the Oracle Text component of Oracle Database Server.  Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and  18c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via OracleNet to compromise Oracle Text.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Text accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Text. CVSS 3.0 Base Score 4.6 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2753</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-211V-11.2.0.4</ProductID>
            <ProductID>P-211V-12.1.0.2</ProductID>
            <ProductID>P-211V-12.2.0.1</ProductID>
            <ProductID>P-211V-18c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.6</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-211V-11.2.0.4</ProductID>
            <ProductID>P-211V-12.1.0.2</ProductID>
            <ProductID>P-211V-12.2.0.1</ProductID>
            <ProductID>P-211V-18c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="177" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2754</Title>
      <Notes>
         <Note Audience="All" Ordinal="177" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1-12.0.3, 12.1.0-12.4.0 and 14.0.0-14.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2754</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="178" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2755</Title>
      <Notes>
         <Note Audience="All" Ordinal="178" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 5.7.25 and prior and  8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2755</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.25 and prior</ProductID>
            <ProductID>P-8478V-8.0.15 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.25 and prior</ProductID>
            <ProductID>P-8478V-8.0.15 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="179" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2756</Title>
      <Notes>
         <Note Audience="All" Ordinal="179" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2756</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="180" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2757</Title>
      <Notes>
         <Note Audience="All" Ordinal="180" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2757</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="181" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2758</Title>
      <Notes>
         <Note Audience="All" Ordinal="181" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2758</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.5</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="182" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2759</Title>
      <Notes>
         <Note Audience="All" Ordinal="182" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2759</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="183" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2760</Title>
      <Notes>
         <Note Audience="All" Ordinal="183" Title="Details" Type="Details">Vulnerability in the Data Store component of Oracle Berkeley DB.  Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and  12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2760</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="184" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2761</Title>
      <Notes>
         <Note Audience="All" Ordinal="184" Title="Details" Type="Details">Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Attachments / File Upload).  Supported versions that are affected are 12.1.3 and  12.2.3 - 12.2.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2761</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-510V-12.1.3</ProductID>
            <ProductID>P-510V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-510V-12.1.3</ProductID>
            <ProductID>P-510V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="185" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2762</Title>
      <Notes>
         <Note Audience="All" Ordinal="185" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Utilities).  Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and  12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2762</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="186" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2763</Title>
      <Notes>
         <Note Audience="All" Ordinal="186" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Gift and Loyalty product of Oracle Food and Beverage Applications (component: iCard).  Supported versions that are affected are 9.0.0 and 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Gift and Loyalty.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality Gift and Loyalty accessible data as well as  unauthorized update, insert or delete access to some of Oracle Hospitality Gift and Loyalty accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2763</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11600V-9.0.0</ProductID>
            <ProductID>P-11600V-9.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11600V-9.0.0</ProductID>
            <ProductID>P-11600V-9.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="187" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2764</Title>
      <Notes>
         <Note Audience="All" Ordinal="187" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2764</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="188" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2766</Title>
      <Notes>
         <Note Audience="All" Ordinal="188" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking).  Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and  12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2766</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="189" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2767</Title>
      <Notes>
         <Note Audience="All" Ordinal="189" Title="Details" Type="Details">Vulnerability in the BI Publisher (formerly XML Publisher) product of Oracle Fusion Middleware (component: BI Publisher Security).  Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and  12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher).  While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as  unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2767</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
            <ProductID>P-1479V-12.2.1.3.0</ProductID>
            <ProductID>P-1479V-12.2.1.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
            <ProductID>P-1479V-12.2.1.3.0</ProductID>
            <ProductID>P-1479V-12.2.1.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="190" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2768</Title>
      <Notes>
         <Note Audience="All" Ordinal="190" Title="Details" Type="Details">Vulnerability in the BI Publisher (formerly XML Publisher) product of Oracle Fusion Middleware (component: BI Publisher Security).   The supported version that is affected is 11.1.1.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher).  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2768</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="191" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2769</Title>
      <Notes>
         <Note Audience="All" Ordinal="191" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Utilities).  Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and  12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2769</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="192" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2770</Title>
      <Notes>
         <Note Audience="All" Ordinal="192" Title="Details" Type="Details">Vulnerability in the Oracle Hyperion Planning product of Oracle Hyperion (component: Smart View).   The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hyperion Planning.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hyperion Planning accessible data. CVSS 3.0 Base Score 4.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2770</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4402V-11.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.5</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4402V-11.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="193" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2771</Title>
      <Notes>
         <Note Audience="All" Ordinal="193" Title="Details" Type="Details">Vulnerability in the BI Publisher (formerly XML Publisher) product of Oracle Fusion Middleware (component: BI Publisher Security).   The supported version that is affected is 11.1.1.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher).  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all BI Publisher (formerly XML Publisher) accessible data as well as  unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of BI Publisher (formerly XML Publisher). CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2771</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1479V-11.1.1.9.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="194" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2772</Title>
      <Notes>
         <Note Audience="All" Ordinal="194" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Activity Guide).  Supported versions that are affected are 8.55, 8.56 and  8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2772</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5085V-8.55</ProductID>
            <ProductID>P-5085V-8.56</ProductID>
            <ProductID>P-5085V-8.57</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="195" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2773</Title>
      <Notes>
         <Note Audience="All" Ordinal="195" Title="Details" Type="Details">Vulnerability in the Oracle Payments product of Oracle E-Business Suite (component: File Transmission).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Payments.  While the vulnerability is in Oracle Payments, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Payments accessible data. CVSS 3.0 Base Score 5.8 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2773</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-378V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-378V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-378V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-378V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="196" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2774</Title>
      <Notes>
         <Note Audience="All" Ordinal="196" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2774</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="197" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2775</Title>
      <Notes>
         <Note Audience="All" Ordinal="197" Title="Details" Type="Details">Vulnerability in the Oracle Payments product of Oracle E-Business Suite (component: File Transmission).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Payments.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Payments accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Payments. CVSS 3.0 Base Score 9.1 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2775</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-378V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-378V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-378V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-378V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="198" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2776</Title>
      <Notes>
         <Note Audience="All" Ordinal="198" Title="Details" Type="Details">Vulnerability in the Core RDBMS component of Oracle Database Server.  Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and  19c. Easily exploitable vulnerability allows high privileged attacker having Create Any Index privilege with network access via OracleNet to compromise Core RDBMS.  While the vulnerability is in Core RDBMS, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Core RDBMS accessible data as well as  unauthorized update, insert or delete access to some of Core RDBMS accessible data. CVSS 3.0 Base Score 7.6 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2776</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-211V-12.1.0.2</ProductID>
            <ProductID>P-211V-12.2.0.1</ProductID>
            <ProductID>P-211V-18c</ProductID>
            <ProductID>P-211V-19c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.6</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-211V-12.1.0.2</ProductID>
            <ProductID>P-211V-12.2.0.1</ProductID>
            <ProductID>P-211V-18c</ProductID>
            <ProductID>P-211V-19c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="199" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2777</Title>
      <Notes>
         <Note Audience="All" Ordinal="199" Title="Details" Type="Details">Vulnerability in the Siebel Core - Server Framework product of Oracle Siebel CRM (component: Search).  Supported versions that are affected are 19.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel Core - Server Framework.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Siebel Core - Server Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Siebel Core - Server Framework accessible data as well as  unauthorized read access to a subset of Siebel Core - Server Framework accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2777</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9001V-19.0 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9001V-19.0 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="200" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2778</Title>
      <Notes>
         <Note Audience="All" Ordinal="200" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2778</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="201" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2779</Title>
      <Notes>
         <Note Audience="All" Ordinal="201" Title="Details" Type="Details">Vulnerability in the Siebel Core - Common Components product of Oracle Siebel CRM (component: Email).  Supported versions that are affected are 19.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Siebel Core - Common Components.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Siebel Core - Common Components accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2779</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9747V-19.0 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.2</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9747V-19.0 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="202" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2780</Title>
      <Notes>
         <Note Audience="All" Ordinal="202" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components / Services).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2780</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="203" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2781</Title>
      <Notes>
         <Note Audience="All" Ordinal="203" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Suite8 product of Oracle Hospitality Applications (component: XML Interface).  Supported versions that are affected are 8.9.6, 8.10.2 and  8.11-8.14. Easily exploitable vulnerability allows low privileged attacker with network access via TCP/IP to compromise Oracle Hospitality Suite8.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality Suite8 accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2781</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-12619V-8.9.6</ProductID>
            <ProductID>P-12619V-8.10.2</ProductID>
            <ProductID>P-12619V-8.11-8.14</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-12619V-8.9.6</ProductID>
            <ProductID>P-12619V-8.10.2</ProductID>
            <ProductID>P-12619V-8.11-8.14</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="204" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2782</Title>
      <Notes>
         <Note Audience="All" Ordinal="204" Title="Details" Type="Details">Vulnerability in the Oracle Payments product of Oracle E-Business Suite (component: File Transmission).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Payments.  While the vulnerability is in Oracle Payments, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Payments accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2782</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-378V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-378V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-378V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-378V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="205" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2783</Title>
      <Notes>
         <Note Audience="All" Ordinal="205" Title="Details" Type="Details">Vulnerability in the Oracle Payments product of Oracle E-Business Suite (component: File Transmission).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Payments.  While the vulnerability is in Oracle Payments, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Payments accessible data. CVSS 3.0 Base Score 5.8 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2783</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-378V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-378V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-378V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-378V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="206" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2784</Title>
      <Notes>
         <Note Audience="All" Ordinal="206" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2784</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="207" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2785</Title>
      <Notes>
         <Note Audience="All" Ordinal="207" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2785</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="208" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2786</Title>
      <Notes>
         <Note Audience="All" Ordinal="208" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security).  Supported versions that are affected are Java SE: 8u212, 11.0.3 and  12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2786</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.4</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="209" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2787</Title>
      <Notes>
         <Note Audience="All" Ordinal="209" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Automount).  Supported versions that are affected are 11.4 and  10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via NFS to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Solaris accessible data as well as  unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2787</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.2</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="210" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2788</Title>
      <Notes>
         <Note Audience="All" Ordinal="210" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Open Fabrics Tools).   The supported version that is affected is 11.4. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.0 Base Score 6.3 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2788</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.3</BaseScore>
            <Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="211" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2789</Title>
      <Notes>
         <Note Audience="All" Ordinal="211" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 2.7 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2789</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.7</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="212" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2790</Title>
      <Notes>
         <Note Audience="All" Ordinal="212" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1-12.0.3, 12.1.0-12.4.0 and 14.0.0-14.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2790</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="213" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2791</Title>
      <Notes>
         <Note Audience="All" Ordinal="213" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in).  Supported versions that are affected are 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data as well as  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2791</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.8</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="214" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2792</Title>
      <Notes>
         <Note Audience="All" Ordinal="214" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2792</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="215" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2793</Title>
      <Notes>
         <Note Audience="All" Ordinal="215" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1-12.0.3, 12.1.0-12.4.0 and 14.0.0-14.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.0 Base Score 3.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2793</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="216" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2794</Title>
      <Notes>
         <Note Audience="All" Ordinal="216" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1-12.0.3, 12.1.0-12.4.0 and 14.0.0-14.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2794</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="217" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2795</Title>
      <Notes>
         <Note Audience="All" Ordinal="217" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Charsets).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2795</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="218" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2796</Title>
      <Notes>
         <Note Audience="All" Ordinal="218" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2796</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="219" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2797</Title>
      <Notes>
         <Note Audience="All" Ordinal="219" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs).  Supported versions that are affected are 5.7.26 and prior and  8.0.16 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.2 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2797</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.2</BaseScore>
            <Vector>AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="220" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2798</Title>
      <Notes>
         <Note Audience="All" Ordinal="220" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2798</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.15 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.15 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="221" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2799</Title>
      <Notes>
         <Note Audience="All" Ordinal="221" Title="Details" Type="Details">Vulnerability in the Oracle ODBC Driver component of Oracle Database Server.  Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and  18c. Difficult to exploit vulnerability allows low privileged attacker having None privilege with network access via multiple protocols to compromise Oracle ODBC Driver.  Successful attacks of this vulnerability can result in takeover of Oracle ODBC Driver.  Note: The vulnerability affects Windows platforms only. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2799</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-579V-11.2.0.4</ProductID>
            <ProductID>P-579V-12.1.0.2</ProductID>
            <ProductID>P-579V-12.2.0.1</ProductID>
            <ProductID>P-579V-18c</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-579V-11.2.0.4</ProductID>
            <ProductID>P-579V-12.1.0.2</ProductID>
            <ProductID>P-579V-12.2.0.1</ProductID>
            <ProductID>P-579V-18c</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="222" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2800</Title>
      <Notes>
         <Note Audience="All" Ordinal="222" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2800</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="223" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2801</Title>
      <Notes>
         <Note Audience="All" Ordinal="223" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2801</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="224" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2802</Title>
      <Notes>
         <Note Audience="All" Ordinal="224" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2802</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="225" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2803</Title>
      <Notes>
         <Note Audience="All" Ordinal="225" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2803</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="226" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2804</Title>
      <Notes>
         <Note Audience="All" Ordinal="226" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem).  Supported versions that are affected are 11.4 and  10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2804</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="227" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2805</Title>
      <Notes>
         <Note Audience="All" Ordinal="227" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser).  Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2805</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="228" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2807</Title>
      <Notes>
         <Note Audience="All" Ordinal="228" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Zones).   The supported version that is affected is 11.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.0 Base Score 3.9 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2807</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.9</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="229" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2808</Title>
      <Notes>
         <Note Audience="All" Ordinal="229" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2808</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="230" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2809</Title>
      <Notes>
         <Note Audience="All" Ordinal="230" Title="Details" Type="Details">Vulnerability in the Oracle iRecruitment product of Oracle E-Business Suite (component: Password Reset).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iRecruitment.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle iRecruitment. CVSS 3.0 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2809</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1193V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-1193V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1193V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-1193V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="231" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2810</Title>
      <Notes>
         <Note Audience="All" Ordinal="231" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2810</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="232" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2811</Title>
      <Notes>
         <Note Audience="All" Ordinal="232" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2811</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="233" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2812</Title>
      <Notes>
         <Note Audience="All" Ordinal="233" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2812</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="234" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2813</Title>
      <Notes>
         <Note Audience="All" Ordinal="234" Title="Details" Type="Details">Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM).   The supported version that is affected is 19.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition.  While the vulnerability is in Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 7.7 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2813</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13497V-19.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13497V-19.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="235" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2814</Title>
      <Notes>
         <Note Audience="All" Ordinal="235" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.16 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 2.2 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2814</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.2</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="236" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2815</Title>
      <Notes>
         <Note Audience="All" Ordinal="236" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2815</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="237" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2816</Title>
      <Notes>
         <Note Audience="All" Ordinal="237" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking).  Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and  12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as  unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2816</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.8</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="238" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2817</Title>
      <Notes>
         <Note Audience="All" Ordinal="238" Title="Details" Type="Details">Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Folders, Files &amp; Attachments).  Supported versions that are affected are 9.3.3, 9.3.4, 9.3.5 and  9.3.6. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Agile PLM accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Agile PLM. CVSS 3.0 Base Score 5.4 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2817</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4461V-9.3.3</ProductID>
            <ProductID>P-4461V-9.3.4</ProductID>
            <ProductID>P-4461V-9.3.5</ProductID>
            <ProductID>P-4461V-9.3.6</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4461V-9.3.3</ProductID>
            <ProductID>P-4461V-9.3.4</ProductID>
            <ProductID>P-4461V-9.3.5</ProductID>
            <ProductID>P-4461V-9.3.6</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="239" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2818</Title>
      <Notes>
         <Note Audience="All" Ordinal="239" Title="Details" Type="Details">Vulnerability in the Java SE product of Oracle Java SE (component: Security).  Supported versions that are affected are Java SE: 11.0.3 and  12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Java SE accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2818</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 11.0.3</ProductID>
            <ProductID>P-856V-12.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.1</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 11.0.3</ProductID>
            <ProductID>P-856V-12.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="240" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2819</Title>
      <Notes>
         <Note Audience="All" Ordinal="240" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Audit).  Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and  8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2819</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.5</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.6.44 and prior</ProductID>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="241" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2820</Title>
      <Notes>
         <Note Audience="All" Ordinal="241" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Gnuplot).   The supported version that is affected is 11.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2820</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="242" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2821</Title>
      <Notes>
         <Note Audience="All" Ordinal="242" Title="Details" Type="Details">Vulnerability in the Java SE product of Oracle Java SE (component: JSSE).  Supported versions that are affected are Java SE: 11.0.3 and  12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Java SE accessible data.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2821</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 11.0.3</ProductID>
            <ProductID>P-856V-12.0.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 11.0.3</ProductID>
            <ProductID>P-856V-12.0.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="243" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2822</Title>
      <Notes>
         <Note Audience="All" Ordinal="243" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Shell: Admin / InnoDB Cluster).  Supported versions that are affected are 8.0.16 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2822</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="244" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2823</Title>
      <Notes>
         <Note Audience="All" Ordinal="244" Title="Details" Type="Details">Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 8.0.5-8.0.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Financial Services Analytical Applications Infrastructure accessible data as well as  unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2823</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5680V-8.0.5-8.0.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5680V-8.0.5-8.0.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="245" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2824</Title>
      <Notes>
         <Note Audience="All" Ordinal="245" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components).  Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2824</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0.0</ProductID>
            <ProductID>P-5242V-12.1.3.0.0</ProductID>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.5</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5242V-10.3.6.0.0</ProductID>
            <ProductID>P-5242V-12.1.3.0.0</ProductID>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="246" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2825</Title>
      <Notes>
         <Note Audience="All" Ordinal="246" Title="Details" Type="Details">Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: Oracle Diagnostics Interfaces).  Supported versions that are affected are 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Applications Manager.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Applications Manager accessible data as well as  unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2825</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-99V-12.1.3</ProductID>
            <ProductID>P-99V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-99V-12.1.3</ProductID>
            <ProductID>P-99V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="247" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2826</Title>
      <Notes>
         <Note Audience="All" Ordinal="247" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2826</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="248" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2827</Title>
      <Notes>
         <Note Audience="All" Ordinal="248" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components).  Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data as well as  unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2827</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0.0</ProductID>
            <ProductID>P-5242V-12.1.3.0.0</ProductID>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.5</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5242V-10.3.6.0.0</ProductID>
            <ProductID>P-5242V-12.1.3.0.0</ProductID>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="249" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2828</Title>
      <Notes>
         <Note Audience="All" Ordinal="249" Title="Details" Type="Details">Vulnerability in the Oracle Field Service product of Oracle E-Business Suite (component: Wireless).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Field Service.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Field Service, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Field Service. CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2828</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-747V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-747V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.6</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-747V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-747V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="250" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2829</Title>
      <Notes>
         <Note Audience="All" Ordinal="250" Title="Details" Type="Details">Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Service Requests).  Supported versions that are affected are 12.1.1 - 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupport.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as  unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2829</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-381V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-381V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-381V-12.1.1 - 12.1.3</ProductID>
            <ProductID>P-381V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="251" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2830</Title>
      <Notes>
         <Note Audience="All" Ordinal="251" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2830</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="252" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2831</Title>
      <Notes>
         <Note Audience="All" Ordinal="252" Title="Details" Type="Details">Vulnerability in the PeopleSoft Enterprise FIN Project Costing product of Oracle PeopleSoft (component: Projects).   The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Project Costing.  While the vulnerability is in PeopleSoft Enterprise FIN Project Costing, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Project Costing accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise FIN Project Costing. CVSS 3.0 Base Score 6.4 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2831</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5013V-9.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5013V-9.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="253" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2832</Title>
      <Notes>
         <Note Audience="All" Ordinal="253" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment).   The supported version that is affected is 10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2832</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="254" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2833</Title>
      <Notes>
         <Note Audience="All" Ordinal="254" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Import/Export).   The supported version that is affected is 18.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony.  While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 7.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2833</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11594V-18.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11594V-18.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="255" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2834</Title>
      <Notes>
         <Note Audience="All" Ordinal="255" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2834</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="256" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2835</Title>
      <Notes>
         <Note Audience="All" Ordinal="256" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2835</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="257" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2836</Title>
      <Notes>
         <Note Audience="All" Ordinal="257" Title="Details" Type="Details">Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Engagement).   The supported version that is affected is 18.2.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2836</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-11594V-18.2.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-11594V-18.2.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="258" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2837</Title>
      <Notes>
         <Note Audience="All" Ordinal="258" Title="Details" Type="Details">Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: User Interface).  Supported versions that are affected are 12.1.3 and  12.2.3 - 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as  unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2837</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1199V-12.1.3</ProductID>
            <ProductID>P-1199V-12.2.3 - 12.2.8</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1199V-12.1.3</ProductID>
            <ProductID>P-1199V-12.2.3 - 12.2.8</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="259" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2838</Title>
      <Notes>
         <Note Audience="All" Ordinal="259" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel).   The supported version that is affected is 11.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via NFS to compromise Oracle Solaris.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data. CVSS 3.0 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2838</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="260" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2839</Title>
      <Notes>
         <Note Audience="All" Ordinal="260" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.1.0-12.4.0 and 14.0.0-14.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2839</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="261" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2840</Title>
      <Notes>
         <Note Audience="All" Ordinal="261" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1-12.0.3, 12.1.0-12.4.0 and 14.0.0-14.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2840</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9052V-12.0.1-12.0.3</ProductID>
            <ProductID>P-9052V-12.1.0-12.4.0</ProductID>
            <ProductID>P-9052V-14.0.0-14.2.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="262" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2841</Title>
      <Notes>
         <Note Audience="All" Ordinal="262" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Investor Servicing accessible data as well as  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2841</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.1</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="263" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2842</Title>
      <Notes>
         <Note Audience="All" Ordinal="263" Title="Details" Type="Details">Vulnerability in the Java SE product of Oracle Java SE (component: JCE).   The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2842</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 8u212</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.7</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 8u212</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="264" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2843</Title>
      <Notes>
         <Note Audience="All" Ordinal="264" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data as well as  unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2843</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="265" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2844</Title>
      <Notes>
         <Note Audience="All" Ordinal="265" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: LDAP Client Tools).   The supported version that is affected is 11.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2844</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="266" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2845</Title>
      <Notes>
         <Note Audience="All" Ordinal="266" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Investor Servicing. CVSS 3.0 Base Score 3.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2845</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.5</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="267" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2846</Title>
      <Notes>
         <Note Audience="All" Ordinal="267" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2846</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="268" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2847</Title>
      <Notes>
         <Note Audience="All" Ordinal="268" Title="Details" Type="Details">Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure).  Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2847</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.7</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9099V-12.0.1</ProductID>
            <ProductID>P-9099V-12.0.3</ProductID>
            <ProductID>P-9099V-12.0.4</ProductID>
            <ProductID>P-9099V-12.1.0</ProductID>
            <ProductID>P-9099V-12.3.0</ProductID>
            <ProductID>P-9099V-12.4.0</ProductID>
            <ProductID>P-9099V-14.0.0</ProductID>
            <ProductID>P-9099V-14.1.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="269" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2848</Title>
      <Notes>
         <Note Audience="All" Ordinal="269" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2848</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="270" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2850</Title>
      <Notes>
         <Note Audience="All" Ordinal="270" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox.  Note: The vulnerability affects Windows platforms only. CVSS 3.0 Base Score 2.8 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2850</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  2.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="271" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2852</Title>
      <Notes>
         <Note Audience="All" Ordinal="271" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2852</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="272" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2853</Title>
      <Notes>
         <Note Audience="All" Ordinal="272" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2853</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="273" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2854</Title>
      <Notes>
         <Note Audience="All" Ordinal="273" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2854</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="274" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2855</Title>
      <Notes>
         <Note Audience="All" Ordinal="274" Title="Details" Type="Details">Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters).   The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as  unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology.  Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2855</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2276V-8.5.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.3</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2276V-8.5.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="275" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2856</Title>
      <Notes>
         <Note Audience="All" Ordinal="275" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Application Container - JavaEE).   The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2856</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-5242V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="276" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2857</Title>
      <Notes>
         <Note Audience="All" Ordinal="276" Title="Details" Type="Details">Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: UIF Open UI).  Supported versions that are affected are 19.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel UI Framework.  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Siebel UI Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Siebel UI Framework accessible data as well as  unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2857</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9011V-19.0 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.4</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9011V-19.0 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="277" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2858</Title>
      <Notes>
         <Note Audience="All" Ordinal="277" Title="Details" Type="Details">Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: Advanced Console).  Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Identity Manager.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Identity Manager accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2858</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1980V-11.1.2.3.0</ProductID>
            <ProductID>P-1980V-12.2.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.3</BaseScore>
            <Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1980V-11.1.2.3.0</ProductID>
            <ProductID>P-1980V-12.2.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="278" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2859</Title>
      <Notes>
         <Note Audience="All" Ordinal="278" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2859</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.8</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="279" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2861</Title>
      <Notes>
         <Note Audience="All" Ordinal="279" Title="Details" Type="Details">Vulnerability in the Oracle Hyperion Planning product of Oracle Hyperion (component: Security).   The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hyperion Planning.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Hyperion Planning accessible data. CVSS 3.0 Base Score 4.2 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2861</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-4402V-11.1.2.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.2</BaseScore>
            <Vector>AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-4402V-11.1.2.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="280" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2862</Title>
      <Notes>
         <Note Audience="All" Ordinal="280" Title="Details" Type="Details">Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: Java).   The supported version that is affected is 19.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 6.8 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2862</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-13497V-19.0.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.8</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-13497V-19.0.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="281" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2863</Title>
      <Notes>
         <Note Audience="All" Ordinal="281" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2863</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.5</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="282" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2864</Title>
      <Notes>
         <Note Audience="All" Ordinal="282" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2864</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="283" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2865</Title>
      <Notes>
         <Note Audience="All" Ordinal="283" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2865</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="284" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2866</Title>
      <Notes>
         <Note Audience="All" Ordinal="284" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2866</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="285" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2867</Title>
      <Notes>
         <Note Audience="All" Ordinal="285" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2867</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  8.2</BaseScore>
            <Vector>AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="286" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2868</Title>
      <Notes>
         <Note Audience="All" Ordinal="286" Title="Details" Type="Details">Vulnerability in the Data Store component of Oracle Berkeley DB.  Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and  12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2868</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="287" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2869</Title>
      <Notes>
         <Note Audience="All" Ordinal="287" Title="Details" Type="Details">Vulnerability in the Data Store component of Oracle Berkeley DB.  Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and  12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2869</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="288" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2870</Title>
      <Notes>
         <Note Audience="All" Ordinal="288" Title="Details" Type="Details">Vulnerability in the Data Store component of Oracle Berkeley DB.  Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and  12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2870</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="289" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2871</Title>
      <Notes>
         <Note Audience="All" Ordinal="289" Title="Details" Type="Details">Vulnerability in the Data Store component of Oracle Berkeley DB.  Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and  12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2871</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.0</BaseScore>
            <Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-2051V-12.1.6.1.23</ProductID>
            <ProductID>P-2051V-12.1.6.1.26</ProductID>
            <ProductID>P-2051V-12.1.6.1.29</ProductID>
            <ProductID>P-2051V-12.1.6.1.36</ProductID>
            <ProductID>P-2051V-12.1.6.2.23</ProductID>
            <ProductID>P-2051V-12.1.6.2.32</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="290" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2873</Title>
      <Notes>
         <Note Audience="All" Ordinal="290" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2873</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="291" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2874</Title>
      <Notes>
         <Note Audience="All" Ordinal="291" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2874</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="292" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2875</Title>
      <Notes>
         <Note Audience="All" Ordinal="292" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2875</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="293" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2876</Title>
      <Notes>
         <Note Audience="All" Ordinal="293" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 3.3 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2876</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  3.3</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="294" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2877</Title>
      <Notes>
         <Note Audience="All" Ordinal="294" Title="Details" Type="Details">Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core).  Supported versions that are affected are Prior to 5.2.32 and  prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 5.5 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2877</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  5.5</BaseScore>
            <Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8370V-Prior to 5.2.32</ProductID>
            <ProductID>P-8370V-prior to 6.0.10</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="295" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2878</Title>
      <Notes>
         <Note Audience="All" Ordinal="295" Title="Details" Type="Details">Vulnerability in the Sun ZFS Storage Appliance Kit (AK) product of Oracle Systems (component: HTTP data path subsystems).   The supported version that is affected is 8.8.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance Kit (AK).  Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Sun ZFS Storage Appliance Kit (AK), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Sun ZFS Storage Appliance Kit (AK) accessible data as well as  unauthorized read access to a subset of Sun ZFS Storage Appliance Kit (AK) accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2878</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10026V-8.8.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10026V-8.8.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="296" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2879</Title>
      <Notes>
         <Note Audience="All" Ordinal="296" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2879</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  4.9</BaseScore>
            <Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-8.0.16 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="297" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-3822</Title>
      <Notes>
         <Note Audience="All" Ordinal="297" Title="Details" Type="Details">Vulnerability in the Enterprise Manager Ops Center product of Oracle Enterprise Manager (component: Networking (cURL)).  Supported versions that are affected are 12.3.3 and 12.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Ops Center.  Successful attacks of this vulnerability can result in takeover of Enterprise Manager Ops Center. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-3822</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-9835V-12.3.3</ProductID>
            <ProductID>P-9835V-12.4.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-9835V-12.3.3</ProductID>
            <ProductID>P-9835V-12.4.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="298" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-3822</Title>
      <Notes>
         <Note Audience="All" Ordinal="298" Title="Details" Type="Details">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging (cURL)).  Supported versions that are affected are 5.7.26 and prior and  8.0.15 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-3822</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.15 and prior</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-8478V-5.7.26 and prior</ProductID>
            <ProductID>P-8478V-8.0.15 and prior</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="299" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-3822</Title>
      <Notes>
         <Note Audience="All" Ordinal="299" Title="Details" Type="Details">Vulnerability in the Services Tools Bundle product of Oracle Support Tools (component: Utilities (cURL)).   The supported version that is affected is 19.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Services Tools Bundle.  Successful attacks of this vulnerability can result in takeover of Services Tools Bundle. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-3822</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-1330V-19.2</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-1330V-19.2</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="300" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-5597</Title>
      <Notes>
         <Note Audience="All" Ordinal="300" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel).  Supported versions that are affected are 11.4 and  11.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via IPv6 to compromise Oracle Solaris.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.0 Base Score 9.1 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-5597</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
            <ProductID>P-10006V-11.3</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.1</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
            <ProductID>P-10006V-11.3</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="301" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-5598</Title>
      <Notes>
         <Note Audience="All" Ordinal="301" Title="Details" Type="Details">Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel).   The supported version that is affected is 11.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via ICMPv6 to compromise Oracle Solaris.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data. CVSS 3.0 Base Score 7.5 (Integrity impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-5598</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10006V-11.4</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  7.5</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-10006V-11.4</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="302" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-7317</Title>
      <Notes>
         <Note Audience="All" Ordinal="302" Title="Details" Type="Details">Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: AWT (libpng)).  Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and  12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded.  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-7317</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  6.8</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>CPUJul2019</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/cpujul2019-5072835.html</URL>
            <ProductID>P-856V-Java SE: 7u221</ProductID>
            <ProductID>P-856V-8u212</ProductID>
            <ProductID>P-856V-11.0.3</ProductID>
            <ProductID>P-856V-12.0.1; Java SE Embedded: 8u211</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
</cvrf:cvrfdoc>
