CVE-2022-22965
📊 9.8 CRITICAL⚡ 94.4%🎯 74 exploits🏛️ KEV Listed
📅 Published Apr 1, 2022
📋 Status: Analyzed
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
CVSS v3.1 • NVD
🎯 Affected Products & Systems
98 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String |
|---|---|---|---|---|---|
📱App | vmware | spring framework | < 5.2.20 | Vulnerable | cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* |
📱App | vmware | spring framework | ≥ 5.3.0 ∧ < 5.3.18 | Vulnerable | cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* |
📱App | oracle | jdk | ≥ 9 | Not Vulnerable | cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:* |
📱App | cisco | cx cloud agent | < 2.1.0 | Vulnerable | cpe:2.3:a:cisco:cx_cloud_agent:*:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core automated test suite | 1.9.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core automated test suite | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core console | 1.9.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core console | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core network exposure function | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core network function cloud native environment | 1.10.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core network function cloud native environment | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core network repository function | 1.15.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core network repository function | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core network slice selection function | 1.8.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core network slice selection function | 1.15.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.15.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core network slice selection function | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core policy | 1.15.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core policy | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core security edge protection proxy | 1.7.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core security edge protection proxy | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core unified data repository | 1.15.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core unified data repository | 22.1.0 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:* |
📱App | oracle | communications policy management | 12.6.0.0.0 | Vulnerable | cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:* |
📱App | oracle | financial services analytical applications infrastructure | 8.1.1 | Vulnerable | cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1:*:*:*:*:*:*:* |
📱App | oracle | financial services analytical applications infrastructure | 8.1.2.0 | Vulnerable | cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.0:*:*:*:*:*:*:* |
📱App | oracle | financial services behavior detection platform | 8.1.1.0 | Vulnerable | cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.0:*:*:*:*:*:*:* |
📱App | oracle | financial services behavior detection platform | 8.1.1.1 | Vulnerable | cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.1:*:*:*:*:*:*:* |
📱App | oracle | financial services behavior detection platform | 8.1.2.0 | Vulnerable | cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.0:*:*:*:*:*:*:* |
📱App | oracle | financial services enterprise case management | 8.1.1.0 | Vulnerable | cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.0:*:*:*:*:*:*:* |
📱App | oracle | financial services enterprise case management | 8.1.1.1 | Vulnerable | cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.1:*:*:*:*:*:*:* |
📱App | oracle | financial services enterprise case management | 8.1.2.0 | Vulnerable | cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.0:*:*:*:*:*:*:* |
📱App | oracle | mysql enterprise monitor | < 8.0.29 | Vulnerable | cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* |
📱App | oracle | product lifecycle analytics | 3.6.1 | Vulnerable | cpe:2.3:a:oracle:product_lifecycle_analytics:3.6.1:*:*:*:*:*:*:* |
📱App | oracle | retail xstore point of service | 20.0.1 | Vulnerable | cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:* |
📱App | oracle | retail xstore point of service | 21.0.0 | Vulnerable | cpe:2.3:a:oracle:retail_xstore_point_of_service:21.0.0:*:*:*:*:*:*:* |
📱App | oracle | sd-wan edge | 9.0 | Vulnerable | cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:* |
📱App | oracle | sd-wan edge | 9.1 | Vulnerable | cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:* |
📱App | siemens | operation scheduler | < 2.0.4 | Vulnerable | cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:* |
📱App | siemens | sipass integrated | 2.80 | Vulnerable | cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:* |
📱App | siemens | sipass integrated | 2.85 | Vulnerable | cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:* |
📱App | siemens | siveillance identity | 1.5 | Vulnerable | cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:* |
📱App | siemens | siveillance identity | 1.6 | Vulnerable | cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:* |
📱App | veritas | access appliance | 7.4.3 | Vulnerable | cpe:2.3:a:veritas:access_appliance:7.4.3:*:*:*:*:*:*:* |
📱App | veritas | access appliance | 7.4.3.100 | Vulnerable | cpe:2.3:a:veritas:access_appliance:7.4.3.100:*:*:*:*:*:*:* |
📱App | veritas | access appliance | 7.4.3.200 | Vulnerable | cpe:2.3:a:veritas:access_appliance:7.4.3.200:*:*:*:*:*:*:* |
📱App | veritas | access appliance | 7.4.3 | Vulnerable | cpe:2.3:a:veritas:access_appliance:7.4.3:*:*:*:*:*:*:* |
📱App | veritas | access appliance | 7.4.3.100 | Vulnerable | cpe:2.3:a:veritas:access_appliance:7.4.3.100:*:*:*:*:*:*:* |
📱App | veritas | access appliance | 7.4.3.200 | Vulnerable | cpe:2.3:a:veritas:access_appliance:7.4.3.200:*:*:*:*:*:*:* |
📱App | veritas | flex appliance | 1.3 | Vulnerable | cpe:2.3:a:veritas:flex_appliance:1.3:*:*:*:*:*:*:* |
📱App | veritas | flex appliance | 2.0 | Vulnerable | cpe:2.3:a:veritas:flex_appliance:2.0:*:*:*:*:*:*:* |
📱App | veritas | flex appliance | 2.0.1 | Vulnerable | cpe:2.3:a:veritas:flex_appliance:2.0.1:*:*:*:*:*:*:* |
📱App | veritas | flex appliance | 2.0.2 | Vulnerable | cpe:2.3:a:veritas:flex_appliance:2.0.2:*:*:*:*:*:*:* |
📱App | veritas | flex appliance | 2.1 | Vulnerable | cpe:2.3:a:veritas:flex_appliance:2.1:*:*:*:*:*:*:* |
📱App | veritas | netbackup flex scale appliance | 2.1 | Vulnerable | cpe:2.3:a:veritas:netbackup_flex_scale_appliance:2.1:*:*:*:*:*:*:* |
📱App | veritas | netbackup flex scale appliance | 3.0 | Vulnerable | cpe:2.3:a:veritas:netbackup_flex_scale_appliance:3.0:*:*:*:*:*:*:* |
🔧HW | veritas | netbackup appliance | 4.0 | Vulnerable | cpe:2.3:h:veritas:netbackup_appliance:4.0:*:*:*:*:*:*:* |
🔧HW | veritas | netbackup appliance | 4.0.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release1:*:*:*:*:*:* |
🔧HW | veritas | netbackup appliance | 4.0.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release2:*:*:*:*:*:* |
🔧HW | veritas | netbackup appliance | 4.0.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release3:*:*:*:*:*:* |
🔧HW | veritas | netbackup appliance | 4.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_appliance:4.1:*:*:*:*:*:*:* |
🔧HW | veritas | netbackup appliance | 4.1.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release1:*:*:*:*:*:* |
🔧HW | veritas | netbackup appliance | 4.1.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release2:*:*:*:*:*:* |
🔧HW | veritas | netbackup virtual appliance | 4.0 | Vulnerable | cpe:2.3:h:veritas:netbackup_virtual_appliance:4.0:*:*:*:*:*:*:* |
🔧HW | veritas | netbackup virtual appliance | 4.0.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_virtual_appliance:4.0.0.1:maintenance_release1:*:*:*:*:*:* |
🔧HW | veritas | netbackup virtual appliance | 4.0.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_virtual_appliance:4.0.0.1:maintenance_release2:*:*:*:*:*:* |
🔧HW | veritas | netbackup virtual appliance | 4.0.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_virtual_appliance:4.0.0.1:maintenance_release3:*:*:*:*:*:* |
🔧HW | veritas | netbackup virtual appliance | 4.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_virtual_appliance:4.1:*:*:*:*:*:*:* |
🔧HW | veritas | netbackup virtual appliance | 4.1.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_virtual_appliance:4.1.0.1:maintenance_release1:*:*:*:*:*:* |
🔧HW | veritas | netbackup virtual appliance | 4.1.0.1 | Vulnerable | cpe:2.3:h:veritas:netbackup_virtual_appliance:4.1.0.1:maintenance_release2:*:*:*:*:*:* |
📱App | siemens | operation scheduler | < 2.0.4 | Vulnerable | cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:* |
📱App | siemens | simatic speech assistant for machines | < 1.2.1 | Vulnerable | cpe:2.3:a:siemens:simatic_speech_assistant_for_machines:*:*:*:*:*:*:*:* |
📱App | siemens | sinec network management system | < 1.0.3 | Vulnerable | cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:* |
📱App | siemens | sipass integrated | 2.80 | Vulnerable | cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:* |
📱App | siemens | sipass integrated | 2.85 | Vulnerable | cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:* |
📱App | siemens | siveillance identity | 1.5 | Vulnerable | cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:* |
📱App | siemens | siveillance identity | 1.6 | Vulnerable | cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:* |
📱App | oracle | commerce platform | 11.3.2 | Vulnerable | cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:* |
📱App | oracle | communications cloud native core binding support function | 22.1.3 | Vulnerable | cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:* |
📱App | oracle | communications unified inventory management | 7.4.1 | Vulnerable | cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:* |
📱App | oracle | communications unified inventory management | 7.4.2 | Vulnerable | cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:* |
📱App | oracle | communications unified inventory management | 7.5.0 | Vulnerable | cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:* |
📱App | oracle | retail bulk data integration | 16.0.3 | Vulnerable | cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3:*:*:*:*:*:*:* |
📱App | oracle | retail customer management and segmentation foundation | 17.0 | Vulnerable | cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:* |
📱App | oracle | retail customer management and segmentation foundation | 18.0 | Vulnerable | cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:* |
📱App | oracle | retail customer management and segmentation foundation | 19.0 | Vulnerable | cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:* |
📱App | oracle | retail financial integration | 14.1.3.2 | Vulnerable | cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:* |
📱App | oracle | retail financial integration | 15.0.3.1 | Vulnerable | cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:* |
📱App | oracle | retail financial integration | 16.0.3 | Vulnerable | cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:* |
📱App | oracle | retail financial integration | 19.0.1 | Vulnerable | cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:* |
📱App | oracle | retail integration bus | 14.1.3.2 | Vulnerable | cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:* |
📱App | oracle | retail integration bus | 15.0.3.1 | Vulnerable | cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:* |
📱App | oracle | retail integration bus | 16.0.3 | Vulnerable | cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:* |
📱App | oracle | retail integration bus | 19.0.1 | Vulnerable | cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:* |
📱App | oracle | retail merchandising system | 16.0.3 | Vulnerable | cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:* |
📱App | oracle | retail merchandising system | 19.0.1 | Vulnerable | cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:* |
📱App | oracle | weblogic server | 12.2.1.3.0 | Vulnerable | cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* |
📱App | oracle | weblogic server | 12.2.1.4.0 | Vulnerable | cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* |
📱App | oracle | weblogic server | 14.1.1.0.0 | Vulnerable | cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* |
📱
VulnerableApplication
Version: < 5.2.20
CPE:
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: ≥ 5.3.0 ∧ < 5.3.18
CPE:
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: < 2.1.0
CPE:
cpe:2.3:a:cisco:cx_cloud_agent:*:*:*:*:*:*:*:*
📱
VulnerableVersion: 1.9.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
📱
VulnerableVersion: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 1.9.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*
Vulnerable
Version: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*
Vulnerable
Version: 1.10.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*
Vulnerable
Version: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*
Vulnerable
Version: 1.15.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*
Vulnerable
Version: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*
Vulnerable
Version: 1.8.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*
Vulnerable
Version: 1.15.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.15.0:*:*:*:*:*:*:*
Vulnerable
Version: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 1.15.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*
Vulnerable
Version: 1.7.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*
Vulnerable
Version: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*
Vulnerable
Version: 1.15.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*
Vulnerable
Version: 22.1.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 12.6.0.0.0
CPE:
cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 8.1.1
CPE:
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1:*:*:*:*:*:*:*
Vulnerable
Version: 8.1.2.0
CPE:
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 8.1.1.0
CPE:
cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 8.1.1.1
CPE:
cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 8.1.2.0
CPE:
cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 8.1.1.0
CPE:
cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 8.1.1.1
CPE:
cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 8.1.2.0
CPE:
cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: < 8.0.29
CPE:
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 3.6.1
CPE:
cpe:2.3:a:oracle:product_lifecycle_analytics:3.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 20.0.1
CPE:
cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 21.0.0
CPE:
cpe:2.3:a:oracle:retail_xstore_point_of_service:21.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 9.0
CPE:
cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 9.1
CPE:
cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: < 2.0.4
CPE:
cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.80
CPE:
cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.85
CPE:
cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 1.5
CPE:
cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 1.6
CPE:
cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.4.3
CPE:
cpe:2.3:a:veritas:access_appliance:7.4.3:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.4.3.100
CPE:
cpe:2.3:a:veritas:access_appliance:7.4.3.100:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.4.3.200
CPE:
cpe:2.3:a:veritas:access_appliance:7.4.3.200:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.4.3
CPE:
cpe:2.3:a:veritas:access_appliance:7.4.3:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.4.3.100
CPE:
cpe:2.3:a:veritas:access_appliance:7.4.3.100:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.4.3.200
CPE:
cpe:2.3:a:veritas:access_appliance:7.4.3.200:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 1.3
CPE:
cpe:2.3:a:veritas:flex_appliance:1.3:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.0
CPE:
cpe:2.3:a:veritas:flex_appliance:2.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.0.1
CPE:
cpe:2.3:a:veritas:flex_appliance:2.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.0.2
CPE:
cpe:2.3:a:veritas:flex_appliance:2.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.1
CPE:
cpe:2.3:a:veritas:flex_appliance:2.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.1
CPE:
cpe:2.3:a:veritas:netbackup_flex_scale_appliance:2.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 3.0
CPE:
cpe:2.3:a:veritas:netbackup_flex_scale_appliance:3.0:*:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.0
CPE:
cpe:2.3:h:veritas:netbackup_appliance:4.0:*:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.0.0.1
CPE:
cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release1:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.0.0.1
CPE:
cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release2:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.0.0.1
CPE:
cpe:2.3:h:veritas:netbackup_appliance:4.0.0.1:maintenance_release3:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.1
CPE:
cpe:2.3:h:veritas:netbackup_appliance:4.1:*:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.1.0.1
CPE:
cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release1:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.1.0.1
CPE:
cpe:2.3:h:veritas:netbackup_appliance:4.1.0.1:maintenance_release2:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.0
CPE:
cpe:2.3:h:veritas:netbackup_virtual_appliance:4.0:*:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.0.0.1
CPE:
cpe:2.3:h:veritas:netbackup_virtual_appliance:4.0.0.1:maintenance_release1:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.0.0.1
CPE:
cpe:2.3:h:veritas:netbackup_virtual_appliance:4.0.0.1:maintenance_release2:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.0.0.1
CPE:
cpe:2.3:h:veritas:netbackup_virtual_appliance:4.0.0.1:maintenance_release3:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.1
CPE:
cpe:2.3:h:veritas:netbackup_virtual_appliance:4.1:*:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.1.0.1
CPE:
cpe:2.3:h:veritas:netbackup_virtual_appliance:4.1.0.1:maintenance_release1:*:*:*:*:*:*
🔧
VulnerableHardware
Version: 4.1.0.1
CPE:
cpe:2.3:h:veritas:netbackup_virtual_appliance:4.1.0.1:maintenance_release2:*:*:*:*:*:*
📱
VulnerableApplication
Version: < 2.0.4
CPE:
cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: < 1.2.1
CPE:
cpe:2.3:a:siemens:simatic_speech_assistant_for_machines:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: < 1.0.3
CPE:
cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.80
CPE:
cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 2.85
CPE:
cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 1.5
CPE:
cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 1.6
CPE:
cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 11.3.2
CPE:
cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:*
Vulnerable
Version: 22.1.3
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.4.1
CPE:
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.4.2
CPE:
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.5.0
CPE:
cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 16.0.3
CPE:
cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3:*:*:*:*:*:*:*
📱
VulnerableVersion: 17.0
CPE:
cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*
📱
VulnerableVersion: 18.0
CPE:
cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*
📱
VulnerableVersion: 19.0
CPE:
cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:19.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 14.1.3.2
CPE:
cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 15.0.3.1
CPE:
cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 16.0.3
CPE:
cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 19.0.1
CPE:
cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 14.1.3.2
CPE:
cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 15.0.3.1
CPE:
cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 16.0.3
CPE:
cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 19.0.1
CPE:
cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 16.0.3
CPE:
cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 19.0.1
CPE:
cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 12.2.1.3.0
CPE:
cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 12.2.1.4.0
CPE:
cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 14.1.1.0.0
CPE:
cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
98 products•scroll for more
Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED
🔍 Technical Details
Analysis Status
AnalyzedCVSS Details
9.8 (CRITICAL)v3.1
Source: [email protected]
EPSS Details
94.4% (Critical)100.0th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Apr 1, 2022 (3 years ago)
Last Modified
Oct 30, 2025 (2 days ago)
Security Weaknesses2
CWE-94
Available exploits (74)
References10
NVDpatchpatch+7