Vulnerability Name: CVE-2019-11358 (CCN-159633) Assigned: 2019-03-27 Published: 2019-03-27 Updated: 2023-06-22 Summary: jQuery, as used in Drupal core, is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to execute script in a victim's Web browser within the security context of the hosting Web site. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. CVSS v3 Severity: 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N )5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): None
6.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N )5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): None
5.6 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L )5.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:H/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): None
Vulnerability Consequences: Cross-Site Scripting References: Source: MITRE Type: CNACVE-2019-11358 Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisory, VDB Entrycve@mitre.org Source: cve@mitre.org Type: Third Party Advisory, VDB Entrycve@mitre.org Source: cve@mitre.org Type: Third Party Advisory, VDB Entrycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Patch, Third Party Advisorycve@mitre.org Source: CCN Type: IBM Security Bulletin 882578 (API Connect)IBM API Connect's Developer Portal is impacted by vulnerabilities in Drupal core (CVE-2019-10909 CVE-2019-10910 CVE-2019-10911 CVE-2019-11358) Source: cve@mitre.org Type: Mailing List, Patch, Third Party Advisorycve@mitre.org Source: CCN Type: Oracle CPUJul2019Oracle Critical Patch Update Advisory - July 2019 Source: CCN Type: Oracle CPUOct2019Oracle Critical Patch Update Advisory - October 2019 Source: cve@mitre.org Type: Broken Link, Third Party Advisory, VDB Entrycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Release Notes, Vendor Advisorycve@mitre.org Source: XF Type: UNKNOWNdrupal-core-jquery-xss(159633) Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Issue Tracking, Mailing List, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Mailing List, Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: CCN Type: SA-CORE-2019-006Drupal core - Moderately critical - Cross Site Scripting Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: CCN Type: IBM Security Bulletin 886357 (MessageSight)IBM MessageSight/MessageGateway is affected by the following jQuery vulnerability Source: CCN Type: IBM Security Bulletin 1138456 (Watson Studio Local) Vulnerability in jQuery affects IBM Watson Studio Local Source: CCN Type: IBM Security Bulletin 6113428 (Business Process Manager Standard)Multiple security vulnerabilities in Swagger UI affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) Source: CCN Type: IBM Security Bulletin 6147993 (TRIRIGA Application Platform)Vulnerability in jQuery affects IBM Tririga Application Platform (CVE-2019-11358) Source: CCN Type: IBM Security Bulletin 6155493 (Business Process Manager Advanced)Security vulnerabilities in Dojo and jQuery might affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) Source: CCN Type: IBM Security Bulletin 6172563 (Security Information Queue)IBM Security Information Queue uses components with known vulnerabilities (CVE-2019-8331, CVE-2019-11358) Source: CCN Type: IBM Security Bulletin 6173889 (Monitoring)A vulnerability in jQuery affects the IBM Performance Management product (CVE-2019-11358) Source: CCN Type: IBM Security Bulletin 6252755 (License Metric Tool)Security vulnerabilities have been identified in BigFix Platform shipped with IBM License Metric Tool. Source: CCN Type: IBM Security Bulletin 6320065 (Security Guardium Insights)IBM Security Guardium Insights is affected by a jQuery vulnerabilitiy Source: CCN Type: IBM Security Bulletin 6333027 (Security Identity Manager Virtual Appliance)Multiple security vulnerabilities have been fixed in IBM Security Identity Manager Virtual Appliance Source: CCN Type: IBM Security Bulletin 6336251 (Security Secret Server)Multiple Vulnerabilities Have Been Identified In IBM Security Verify Privilege Manager previously known as IBM Security Privilege Manager Source: CCN Type: IBM Security Bulletin 6336361 (Security Secret Server)Multiple Vulnerabilities Have Been Identified In IBM Security Verify Privilege Vault previously known as IBM Security Secret Server Source: CCN Type: IBM Security Bulletin 6347588 (Security Guardium) IBM Security Guardium is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6406730 (Cognos Command Center)IBM Cognos Command Center has addressed multiple vulnerabilities (Q12021) Source: CCN Type: IBM Security Bulletin 6416391 (Spectrum Symphony)Multiple vulnerability issues affect IBM Spectrum Symphony 7.3.1 Source: CCN Type: IBM Security Bulletin 6416393 (Spectrum Conductor)Multiple vulnerability issues affect IBM Spectrum Conductor 2.5.0 Source: CCN Type: IBM Security Bulletin 6473141 (Rational Collaborative Lifecycle Management)Multiple vulnerabilites affect IBM Jazz Foundation and IBM Engineering products. Source: CCN Type: IBM Security Bulletin 6474843 (QRadar SIEM)IBM QRadar SIEM is vulnerable to Using Components with Known Vulnerabilities Source: CCN Type: IBM Security Bulletin 6507095 (Planning Analytics)IBM Planning Analytics Workspace is affected by security vulnerabilities Source: CCN Type: IBM Security Bulletin 6520510 (Cognos Analytics)IBM Cognos Analytics has addressed multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6551876 (Cloud Pak for Security)Cloud Pak for Security uses packages that are vulnerable to multiple CVEs Source: CCN Type: IBM Security Bulletin 6565389 (WebSphere Service Registry and Repository)Multiple vulnerabilities in WebSphere Service Registry and Repository in packages such as Apache Struts and Node.js Source: CCN Type: IBM Security Bulletin 6574037 (Process Mining)Vulnerability in jQuery affects IBM Process Mining (Multiple CVEs) Source: CCN Type: IBM Security Bulletin 6582695 (Cloud Transformation Advisor)IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: CCN Type: Oracle CPUApr2020Oracle Critical Patch Update Advisory - April 2020 Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: CCN Type: Oracle Critical Patch Update Advisory - April 2021Oracle Critical Patch Update Advisory - April 2021 Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: CCN Type: Oracle CPUJan2020Oracle Critical Patch Update Advisory - January 2020 Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: CCN Type: Oracle CPUJan2021Oracle Critical Patch Update Advisory - January 2021 Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: CCN Type: Oracle CPUJul2020Oracle Critical Patch Update Advisory - July 2020 Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: CCN Type: Oracle CPUJul2021Oracle Critical Patch Update Advisory - July 2021 Source: CCN Type: Oracle CPUOct2020Oracle Critical Patch Update Advisory - October 2020 Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: CCN Type: Oracle CPUOct2021Oracle Critical Patch Update Advisory - October 2021 Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Patch, Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Source: cve@mitre.org Type: Third Party Advisorycve@mitre.org Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration CCN 1 :cpe:/a:jquery:jquery:2.1.0:-:*:*:*:*:*:* OR cpe:/a:jquery:jquery:1.4.2:*:*:*:*:*:*:* OR cpe:/a:jquery:jquery:1.0.5:*:*:*:*:*:*:* OR cpe:/a:drupal:drupal:8.6.14:*:*:*:*:*:*:* OR cpe:/a:drupal:drupal:8.5.14:*:*:*:*:*:*:* OR cpe:/a:drupal:drupal:7.65:*:*:*:*:*:*:* AND cpe:/a:ibm:business_process_manager:8.0:*:*:*:advanced:*:*:* OR cpe:/a:ibm:business_process_manager:8.0.1:*:*:*:advanced:*:*:* OR cpe:/a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:* OR cpe:/a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:* OR cpe:/a:ibm:business_process_manager:8.5:*:*:*:advanced:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.5:*:*:*:advanced:*:*:* OR cpe:/a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:* OR cpe:/a:ibm:websphere_service_registry_and_repository:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:messagesight:1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.6:*:*:*:advanced:*:*:* OR cpe:/a:ibm:license_metric_tool:9.2:*:*:*:*:*:*:* OR cpe:/a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.0.2:*:*:*:advanced:*:*:* OR cpe:/a:oracle:retail_point-of-service:14.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:* OR cpe:/a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.7:*:*:*:advanced:*:*:* OR cpe:/a:ibm:api_connect:5.0.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:* OR cpe:/a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.6.1:*:*:*:advanced:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.6.2:*:*:*:advanced:*:*:* OR cpe:/a:oracle:enterprise_manager:13.2:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_data_integration_hub:8.0.5:*:*:*:*:*:*:* OR cpe:/a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:* OR cpe:/a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:* OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* OR cpe:/a:oracle:identity_manager:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:service_bus:11.1.1.9.0:*:*:*:*:*:*:* OR cpe:/a:oracle:service_bus:12.1.3.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:policy_automation:12.1.0:*:*:*:*:*:*:* OR cpe:/a:oracle:policy_automation:12.1.1:*:*:*:*:*:*:* OR cpe:/a:oracle:policy_automation:12.2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:7.3.5:*:*:*:*:*:*:* OR cpe:/a:ibm:monitoring:8.1.4:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_unified_inventory_management:7.3:*:*:*:*:*:*:* OR cpe:/a:oracle:big_data_discovery:1.6.0:*:*:*:*:*:*:* OR cpe:/a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:tririga_application_platform:3.5.3:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:17.12:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_signaling_router:8:*:*:*:*:*:*:* OR cpe:/a:oracle:fusion_middleware_mapviewer:12.2.1.3:*:*:*:*:*:*:* OR cpe:/a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:policy_automation:10.4.7:*:*:*:*:*:*:* OR cpe:/a:oracle:policy_automation:12.2.0:*:*:*:mobile:*:*:* OR cpe:/a:oracle:policy_automation_connector_for_siebel:10.4.6:*:*:*:*:*:*:* OR cpe:/a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:api_connect:2018.1:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* OR cpe:/a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:* OR cpe:/a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* OR cpe:/a:oracle:service_bus:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:healthcare_translational_research:3.1.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_billing_and_revenue_management:12.0:*:*:*:*:*:*:* OR cpe:/a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.8:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_command_center:10.2.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:api_connect:5.0.8.6:*:*:*:*:*:*:* OR cpe:/a:ibm:api_connect:2018.4.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:tririga_application_platform:3.6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:messagesight:5.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:messagesight:5.0.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_interactive_session_recorder:6.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_interactive_session_recorder:6.2:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_interactive_session_recorder:6.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* OR cpe:/a:oracle:hyperion_planning:11.1.2.4:*:*:*:*:*:*:* OR cpe:/a:oracle:application_testing_suite:13.2:*:*:*:*:*:*:* OR cpe:/a:oracle:application_testing_suite:13.3:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_profitability_management:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_funds_transfer_pricing:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_asset_liability_management:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:* OR cpe:/a:oracle:insurance_ifrs_17_analyzer:8.0.6:*:*:*:*:*:*:* OR cpe:/a:oracle:insurance_ifrs_17_analyzer:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:insurance_allocation_manager_for_enterprise_profitability:8.0.8:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_regulatory_reporting_for_european_banking_authority:8.0.6:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_retail_performance_analytics:8.0.6:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_retail_performance_analytics:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:healthcare_foundation:7.1.1:*:*:*:*:*:*:* OR cpe:/a:oracle:healthcare_foundation:7.2.2:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_enterprise_financial_performance_analytics:8.0.6:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_enterprise_financial_performance_analytics:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:healthcare_translational_research:3.2.1:*:*:*:*:*:*:* OR cpe:/a:oracle:healthcare_translational_research:3.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:watson_studio_local:1.2.3:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_gateway:15.2.18:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_gateway:16.2.11:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_gateway:17.12.6:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_gateway:18.8.8.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_interactive_session_recorder:6.3:*:*:*:*:*:*:* OR cpe:/a:ibm:security_information_queue:1.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:security_information_queue:1.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:security_secret_server:10.8:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.6.2:*:*:*:standard:*:*:* OR cpe:/a:ibm:business_process_manager:8.5.6.1:*:*:*:standard:*:*:* OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_information_queue:1.0.5:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:* OR cpe:/a:oracle:knowledge:8.6.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:7.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_identity_manager_virtual_appliance:7.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_identity_manager_virtual_appliance:7.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:* OR cpe:/a:ibm:cognos_command_center:10.2.4.0:*:*:*:*:*:*:* OR cpe:/a:ibm:planning_analytics:2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4.3:-:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3.3:p8:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_for_security:1.7.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
jquery jquery 2.1.0 -
jquery jquery 1.4.2
jquery jquery 1.0.5
drupal drupal 8.6.14
drupal drupal 8.5.14
drupal drupal 7.65
ibm business process manager 8.0
ibm business process manager 8.0.1
ibm business process manager 8.0.1.1
ibm business process manager 8.0.1.2
ibm business process manager 8.5
ibm business process manager 8.5.0.1
ibm business process manager 8.5.5
ibm business process manager 8.0.1.3
ibm websphere service registry and repository 8.5
ibm messagesight 1.2
ibm business process manager 8.5.6
ibm license metric tool 9.2
oracle weblogic server 10.3.6.0.0
oracle weblogic server 12.1.3.0.0
ibm business process manager 8.5.0.2
oracle retail point-of-service 14.0
oracle retail point-of-service 14.1
oracle jd edwards enterpriseone tools 9.2
oracle peoplesoft enterprise peopletools 8.55
ibm rational collaborative lifecycle management 6.0.2
ibm business process manager 8.5.7
ibm api connect 5.0.0.0
oracle jdeveloper 11.1.1.9.0
oracle jdeveloper 12.1.3.0.0
oracle application testing suite 12.5.0.3
ibm business process manager 8.5.6.1
ibm business process manager 8.5.6.2
oracle enterprise manager 13.2
oracle retail customer insights 15.0
oracle retail customer insights 16.0
oracle primavera unifier 16.1
oracle primavera unifier 16.2
oracle financial services data integration hub 8.0.5
oracle weblogic server 12.2.1.3.0
oracle communications webrtc session controller 7.2
oracle hospitality guest access 4.2.0
oracle hospitality guest access 4.2.1
oracle communications billing and revenue management 7.5
oracle peoplesoft enterprise peopletools 8.56
oracle identity manager 12.2.1.3.0
oracle service bus 11.1.1.9.0
oracle service bus 12.1.3.0.0
oracle policy automation 12.1.0
oracle policy automation 12.1.1
oracle policy automation 12.2.0
oracle financial services analytical applications infrastructure 7.3.5
ibm monitoring 8.1.4
oracle financial services market risk measurement and management 8.0.5
oracle communications unified inventory management 7.3
oracle big data discovery 1.6.0
oracle application testing suite 13.1.0.1
oracle application testing suite 13.2.0.1
oracle webcenter sites 12.2.1.3.0
oracle enterprise manager ops center 12.3.3
ibm tririga application platform 3.5.3
oracle primavera unifier 17.12
oracle communications diameter signaling router 8
oracle fusion middleware mapviewer 12.2.1.3
oracle bi publisher 12.2.1.3.0
oracle business process management suite 12.2.1.3.0
oracle policy automation 10.4.7
oracle policy automation 12.2.0
oracle policy automation connector for siebel 10.4.6
oracle jdeveloper 12.2.1.3.0
ibm api connect 2018.1
oracle primavera unifier 18.8
oracle hospitality materials control 18.1
oracle bi publisher 12.2.1.4.0
oracle peoplesoft enterprise peopletools 8.57
oracle service bus 12.2.1.3.0
oracle healthcare translational research 3.1.0
oracle communications billing and revenue management 12.0
oracle agile product lifecycle management for process 6.2.0.0
oracle application testing suite 13.3.0.1
oracle financial services analytical applications infrastructure 8.0.8
ibm qradar security information and event manager 7.3.0
ibm cognos command center 10.2.4.1
ibm api connect 5.0.8.6
ibm api connect 2018.4.1.4
ibm tririga application platform 3.6.0
ibm security information queue 1.0.0
ibm security information queue 1.0.1
ibm security information queue 1.0.2
ibm messagesight 5.0.0.0
ibm messagesight 5.0.0.1
oracle financial services retail customer analytics 8.0.6
oracle financial services institutional performance analytics 8.0.7
oracle communications operations monitor 3.4
oracle communications operations monitor 4.0
oracle communications interactive session recorder 6.1
oracle communications interactive session recorder 6.2
oracle communications interactive session recorder 6.0
oracle communications diameter signaling router 8.1
oracle communications diameter signaling router 8.2
oracle financial services market risk measurement and management 8.0.6
oracle financial services market risk measurement and management 8.0.8
oracle hyperion planning 11.1.2.4
oracle application testing suite 13.2
oracle application testing suite 13.3
oracle financial services profitability management 8.0.7
oracle financial services funds transfer pricing 8.0.7
oracle financial services asset liability management 8.0.7
oracle financial services price creation and discovery 8.0.7
oracle financial services liquidity risk measurement and management 8.0.8
oracle insurance ifrs 17 analyzer 8.0.6
oracle insurance ifrs 17 analyzer 8.0.7
oracle insurance allocation manager for enterprise profitability 8.0.8
oracle banking platform 2.7.1
oracle financial services hedge management and ifrs valuations 8.0.7
oracle financial services loan loss forecasting and provisioning 8.0.7
oracle enterprise manager ops center 12.4.0
oracle financial services regulatory reporting for european banking authority 8.0.7
oracle financial services regulatory reporting for european banking authority 8.0.6
oracle financial services retail performance analytics 8.0.6
oracle financial services retail performance analytics 8.0.7
oracle healthcare foundation 7.1.1
oracle healthcare foundation 7.2.2
oracle financial services enterprise financial performance analytics 8.0.6
oracle financial services enterprise financial performance analytics 8.0.7
oracle healthcare translational research 3.2.1
oracle healthcare translational research 3.3.1
ibm watson studio local 1.2.3
ibm cloud transformation advisor 2.0.1
oracle primavera gateway 15.2.18
oracle primavera gateway 16.2.11
oracle primavera gateway 17.12.6
oracle primavera gateway 18.8.8.1
oracle communications interactive session recorder 6.3
ibm security information queue 1.0.3
ibm security information queue 1.0.4
ibm security secret server 10.8
ibm security guardium 11.0
ibm business process manager 8.5.6.2
ibm business process manager 8.5.6.1
ibm security guardium 11.1
ibm security information queue 1.0.5
oracle communications operations monitor 4.1
oracle communications diameter signaling router 8.2.1
oracle knowledge 8.6.3
ibm rational collaborative lifecycle management 7.0
ibm security identity manager virtual appliance 7.0.2
ibm security guardium insights 2.0.1
ibm security identity manager virtual appliance 7.0.1
ibm qradar security information and event manager 7.4.0
ibm cognos command center 10.2.4.0
ibm planning analytics 2.0
ibm qradar security information and event manager 7.4.3 -
ibm qradar security information and event manager 7.3.3 p8
ibm cloud pak for security 1.7.2.0
ibm cognos analytics 11.2.0
ibm cognos analytics 11.1.7