Vulnerability Name: | CVE-2019-14540 (CCN-167354) |
Assigned: | 2019-08-05 |
Published: | 2019-08-05 |
Updated: | 2021-02-22 |
Summary: | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. |
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) 4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None | 7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-502 CWE-200
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2019-14540
Source: REDHAT Type: Third Party Advisory RHSA-2019:3200
Source: REDHAT Type: Third Party Advisory RHSA-2020:0159
Source: REDHAT Type: Third Party Advisory RHSA-2020:0160
Source: REDHAT Type: Third Party Advisory RHSA-2020:0161
Source: REDHAT Type: Third Party Advisory RHSA-2020:0164
Source: REDHAT Type: Third Party Advisory RHSA-2020:0445
Source: XF Type: UNKNOWN fasterxml-cve201914540-info-disc(167354)
Source: CONFIRM Type: Release Notes, Third Party Advisory https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x
Source: CCN Type: jackson-databind GIT Repository Block one more gadget type (HikariCP, CVE-2019-14540) #2410
Source: MISC Type: Patch, Third Party Advisory https://github.com/FasterXML/jackson-databind/issues/2410
Source: MISC Type: Patch, Third Party Advisory https://github.com/FasterXML/jackson-databind/issues/2449
Source: MLIST Type: Mailing List, Third Party Advisory [tinkerpop-commits] 20190924 [GitHub] [tinkerpop] justinchuch opened a new pull request #1200: Upgrade jackson due to CVE issues
Source: MLIST Type: Mailing List, Third Party Advisory [hbase-issues] 20190925 [GitHub] [hbase] SteNicholas opened a new pull request #660: HBASE-23075 Upgrade jackson version
Source: MLIST Type: Mailing List, Third Party Advisory [drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities
Source: MLIST Type: Third Party Advisory [hbase-issues] 20190926 [GitHub] [hbase-connectors] SteNicholas opened a new pull request #45: HBASE-23075 Upgrade jackson version
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20190925 [GitHub] [zookeeper] maoling commented on issue #1097: ZOOKEEPER-3559 - Update Jackson to 2.9.10
Source: MLIST Type: Third Party Advisory [hbase-issues] 20190926 [jira] [Commented] (HBASE-23075) Upgrade jackson to version 2.9.10 due to CVE-2019-16335 and CVE-2019-14540
Source: MLIST Type: Mailing List, Third Party Advisory [drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [nifi-commits] 20191113 svn commit: r1869773 - /nifi/site/trunk/security.html
Source: MLIST Type: Third Party Advisory [hbase-issues] 20190926 [jira] [Updated] (HBASE-23075) Upgrade jackson to version 2.9.10 due to CVE-2019-16335 and CVE-2019-14540
Source: MLIST Type: Patch, Third Party Advisory [hbase-commits] 20190927 [hbase-connectors] 02/02: HBASE-23075 Upgrade jackson to version 2.9.10 due to CVE-2019-16335 and CVE-2019-14540
Source: MLIST Type: Mailing List, Third Party Advisory [drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities
Source: MLIST Type: Mailing List, Third Party Advisory [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [nifi-commits] 20200421 svn commit: r1876802 - /nifi/site/trunk/registry-security.html
Source: MLIST Type: Mailing List, Patch, Third Party Advisory [nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html
Source: MLIST Type: Mailing List, Third Party Advisory [geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12
Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20191002 [SECURITY] [DLA 1943-1] jackson-databind security update
Source: FEDORA Type: Third Party Advisory FEDORA-2019-cf87377f5f
Source: FEDORA Type: Third Party Advisory FEDORA-2019-b171554877
Source: BUGTRAQ Type: Mailing List, Third Party Advisory 20191007 [SECURITY] [DSA 4542-1] jackson-databind security update
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20191004-0002/
Source: CCN Type: IBM Security Bulletin 1079409 (Event Streams) Security Bulletin: IBM Event Streams is affected by jackson-databind vulnerabilities
Source: DEBIAN Type: Third Party Advisory DSA-4542
Source: CCN Type: IBM Security Bulletin 1126359 (Watson Discovery) IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in FasterXML jackson-databind
Source: CCN Type: IBM Security Bulletin 2403639 (Network Performance Insight) Vulnerabilities affect IBM Network Performance Insight (CVE-2019-14379, CVE-2019-17531, CVE-2019-14439 and CVE-2019-14540)
Source: CCN Type: IBM Security Bulletin 2801613 (Tivoli Netcool/OMNIbus) A vulnerability has been identified in FasterXML Jackson library shipped with IBM Tivoli Netcool/OMNIbus Common Integration Libraries (CVE-2019-14540)
Source: CCN Type: IBM Security Bulletin 3176397 (Spectrum Protect Plus) Multiple vulnerabilities in FasterXML Jackson-databind affect IBM Spectrum Protect Plus (CVE-2019-16943, CVE-2019-16942, CVE-2019-17531, CVE-2019-17267, CVE-2019-14540, CVE-2019-16335, CVE-2019-14379, CVE-2019-14439)
Source: CCN Type: IBM Security Bulletin 6209044 (Global High Availability Mailbox) Multiple security vulnerabilities have been Identified In Jackson Databind library shipped with IBM Global Mailbox
Source: CCN Type: IBM Security Bulletin 6209691 (Sterling B2B Integrator) Multiple Security Vulnerabilities in Jackson-databind Affect IBM Sterling B2B Integrator
Source: CCN Type: IBM Security Bulletin 6217807 (Security Identity Governance and Intelligence) IBM has announced a release for IBM Security Identity Governance and Intelligence in response to security vulnerabilities
Source: CCN Type: IBM Security Bulletin 6243446 (Data Risk Manager) IBM Data Risk Manager is affected by multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6255694 (Rational Rhapsody Design Manager) Multiple vulnerabilities affects IBM Jazz Foundation and IBM Engineering products.
Source: CCN Type: IBM Security Bulletin 6324739 (Security Guardium Insights) IBM Security Guardium Insights is affected by Components with known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6335281 (Data Risk Manager) IBM Data Risk Manager is affected by multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6410462 (Security Trusteer Mobile SDK) Android Mobile SDK compile builder includes vulnerable components
Source: CCN Type: IBM Security Bulletin 6444089 (Log Analysis) Multiple vulnerabilities in FasterXML jackson-databind affect Apache Solr shipped with IBM Operations Analytics - Log Analysis
Source: CCN Type: IBM Security Bulletin 6496727 (Sterling B2B Integrator) Jackson-Databind Vulnerabilities Affect the B2B API of IBM Sterling B2B Integrator
Source: CCN Type: IBM Security Bulletin 6528214 (Cloud Pak for Multicloud Management) IBM Cloud Pak for Multicloud Management Monitoring has patched several open source dependencies
Source: CCN Type: IBM Security Bulletin 6593435 (Process Mining) Vulnerability in jackson-databind affects IBM Process Mining (Multiple CVEs)
Source: CCN Type: IBM Security Bulletin 6594459 (Netcool Operations Insight) Netcool Operations Insight v1.6.4 contains fixes for multiple security vulnerabilities.
Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector) IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6828455 (z/Transaction Processing Facility) z/Transaction Processing Facility is affected by multiple vulnerabilities in the jackson-databind, jackson-dataformat-xml, jackson-core, slf4j-ext, and cxf-core packages
Source: CCN Type: IBM Security Bulletin 6840955 (Log Analysis) Multiple vulnerabilities in Data-Binding for Jackson shipped with IBM Operations Analytics - Log Analysis
Source: CCN Type: IBM Security Bulletin 6910171 (Integration Designer) Multiple CVEs affect IBM Integration Designer
Source: CCN Type: IBM Security Bulletin 6983482 (Security Verify Governance) IBM Security Verify Governance is vulnerable to a denial of service caused by multiple vulnerabilities.
Source: N/A Type: Third Party Advisory N/A
Source: CCN Type: Oracle CPUJan2020 Oracle Critical Patch Update Advisory - January 2020
Source: MISC Type: Third Party Advisory https://www.oracle.com/security-alerts/cpujan2020.html
Source: MISC Type: Third Party Advisory https://www.oracle.com/security-alerts/cpujul2020.html
Source: MISC Type: Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2020.html
Source: MISC Type: Third Party Advisory https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
Vulnerable Configuration: | Configuration 1: cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.6.0 and < 2.6.7.3)OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.8.0 and < 2.8.11.5)OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.9.0 and < 2.9.10) Configuration 2: cpe:/a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*OR cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*OR cpe:/a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:fedoraproject:fedora:30:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:31:*:*:*:*:*:*:* Configuration 4: cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:* Configuration 5: cpe:/a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*OR cpe:/a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* Configuration 6: cpe:/a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*OR cpe:/a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*OR cpe:/a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*OR cpe:/a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*OR cpe:/a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*OR cpe:/a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*OR cpe:/a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*OR cpe:/a:oracle:customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* (Version >= 8.0.2 and <= 8.0.8)OR cpe:/a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:* (Version < 11.2.0.3.23)OR cpe:/a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:* (Version >= 12.2.0.1.0 and < 12.2.0.1.19)OR cpe:/a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:* (Version >= 13.9.4.0.0 and < 13.9.4.2.1)OR cpe:/a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*OR cpe:/a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:* (Version < 19.1.0.0.1)OR cpe:/a:oracle:mysql:*:*:*:*:*:*:*:* (Version >= 5.7.0 and <= 5.7.30)OR cpe:/a:oracle:mysql:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.0.20)OR cpe:/a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:15.2.18:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:16.2.11:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:17.12.6:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:18.8.0:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:18.8.8.1:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:*:*:*:*:*:*:*:* (Version >= 17.7 and <= 17.12)OR cpe:/a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*OR cpe:/a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:fasterxml:jackson-databind:2.9.9:*:*:*:*:*:*:*AND cpe:/a:ibm:tivoli_netcool/omnibus:8.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:17.12:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:watson_discovery:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:watson_discovery:2.0.0:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:15.2.18:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:16.2.11:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:17.12.6:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_gateway:18.8.8.1:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.5:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.5.3:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.6.0:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.2:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.3:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.4:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.5:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.6:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.6.2:*:*:*:*:*:*:*OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:*OR cpe:/a:ibm:integration_designer:20.0.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
fasterxml jackson-databind *
fasterxml jackson-databind *
fasterxml jackson-databind *
netapp oncommand api services -
netapp oncommand workflow automation -
netapp steelstore cloud integrated storage -
fedoraproject fedora 30
fedoraproject fedora 31
debian debian linux 8.0
debian debian linux 9.0
debian debian linux 10.0
redhat jboss enterprise application platform 7.2
redhat jboss enterprise application platform 7.3
redhat enterprise linux 6.0
redhat enterprise linux 7.0
redhat enterprise linux 8.0
oracle banking platform 2.4.0
oracle banking platform 2.4.1
oracle banking platform 2.5.0
oracle banking platform 2.6.0
oracle banking platform 2.6.1
oracle banking platform 2.7.0
oracle banking platform 2.7.1
oracle customer management and segmentation foundation 18.0
oracle financial services analytical applications infrastructure *
oracle global lifecycle management opatch *
oracle global lifecycle management opatch *
oracle global lifecycle management opatch *
oracle goldengate application adapters 19.1.0.0.0
oracle goldengate stream analytics *
oracle mysql *
oracle mysql *
oracle primavera gateway 15.2
oracle primavera gateway 15.2.18
oracle primavera gateway 16.2
oracle primavera gateway 16.2.11
oracle primavera gateway 17.12
oracle primavera gateway 17.12.6
oracle primavera gateway 18.8.0
oracle primavera gateway 18.8.8.1
oracle primavera unifier 16.1
oracle primavera unifier 16.2
oracle primavera unifier *
oracle primavera unifier 18.8
oracle primavera unifier 19.12
oracle retail customer management and segmentation foundation 17.0
oracle retail xstore point of service 7.1
oracle retail xstore point of service 15.0
oracle retail xstore point of service 16.0
oracle retail xstore point of service 17.0
oracle retail xstore point of service 18.0
oracle weblogic server 12.2.1.3.0
fasterxml jackson-databind 2.9.9
ibm tivoli netcool/omnibus 8.1.0
ibm rational rhapsody design manager 6.0.2
oracle primavera unifier 16.1
oracle primavera unifier 16.2
ibm spectrum protect plus 10.1.0
oracle primavera unifier 17.12
oracle primavera unifier 18.8
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm sterling b2b integrator 6.0.1.0
ibm event streams 2019.2.1
ibm watson discovery 2.0.1
ibm watson discovery 2.0.0
oracle primavera unifier 19.12
oracle primavera gateway 15.2.18
oracle primavera gateway 16.2.11
oracle primavera gateway 17.12.6
oracle primavera gateway 18.8.8.1
ibm spectrum protect plus 10.1.5
ibm data risk manager 2.0.1
ibm data risk manager 2.0.2
ibm data risk manager 2.0.3
ibm data risk manager 2.0.4
ibm data risk manager 2.0.5
ibm data risk manager 2.0.6
ibm sterling b2b integrator 6.0.3.1
ibm security identity governance and intelligence 5.2.6
ibm log analysis 1.3.5.3
ibm log analysis 1.3.6.0
ibm log analysis 1.3.1
ibm log analysis 1.3.2
ibm log analysis 1.3.3
ibm log analysis 1.3.4
ibm log analysis 1.3.5
ibm log analysis 1.3.6
ibm data risk manager 2.0.6.1
ibm data risk manager 2.0.6.2
ibm security guardium insights 2.0.1
ibm log analysis 1.3.6.1
ibm sterling b2b integrator 6.1.0.0
ibm integration designer 20.0.0.2
ibm security verify governance 10.0