Vulnerability Name: | CVE-2019-20330 (CCN-173897) |
Assigned: | 2019-10-25 |
Published: | 2019-10-25 |
Updated: | 2022-10-29 |
Summary: | FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. |
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) 6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low | 8.1 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-502
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2019-20330
Source: XF Type: UNKNOWN fasterxml-cve201920330-unspecified(173897)
Source: MISC Type: Patch, Third Party Advisory https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2
Source: CCN Type: jackson-databind GIT Repository Block two more gadget types (ehcache/JNDI - CVEs to be allocated) #2526
Source: MISC Type: Patch, Third Party Advisory https://github.com/FasterXML/jackson-databind/issues/2526
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-dev] 20200118 Build failed in Jenkins: zookeeper-master-maven-owasp #329
Source: MLIST Type: Mailing List, Third Party Advisory [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200123 [GitHub] [zookeeper] nkalmar commented on issue #1232: ZOOKEEPER-3699: upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200115 [druid] branch 0.17.0 updated: Suppress CVE-2019-20330 for htrace-core-4.0.1 (#9189) (#9191)
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200123 [jira] [Updated] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200122 [jira] [Updated] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200122 [jira] [Commented] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-dev] 20200118 [jira] [Created] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200115 [GitHub] [druid] ccaominh opened a new pull request #9191: [Backport] Suppress CVE-2019-20330 for htrace-core-4.0.1 (#9189)
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200118 [jira] [Commented] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-commits] 20200123 [zookeeper] branch branch-3.5 updated: ZOOKEEPER-3699: upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200123 [jira] [Resolved] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-commits] 20200123 [zookeeper] branch branch-3.6 updated: ZOOKEEPER-3699: upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200115 [GitHub] [druid] clintropolis merged pull request #9191: [Backport] Suppress CVE-2019-20330 for htrace-core-4.0.1 (#9189)
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-commits] 20200123 [zookeeper] branch master updated: ZOOKEEPER-3699: upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200118 [jira] [Created] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200122 [GitHub] [zookeeper] phunt commented on issue #1232: ZOOKEEPER-3699: upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200122 [GitHub] [zookeeper] phunt opened a new pull request #1232: ZOOKEEPER-3699: upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-dev] 20200122 Re: 3.5.7
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200115 [GitHub] [druid] clintropolis merged pull request #9189: Suppress CVE-2019-20330 for htrace-core-4.0.1
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200123 [jira] [Commented] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-notifications] 20200123 [GitHub] [zookeeper] asfgit closed pull request #1232: ZOOKEEPER-3699: upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [druid-commits] 20200114 [GitHub] [druid] ccaominh opened a new pull request #9189: Suppress CVE-2019-20330 for htrace-core-4.0.1
Source: MLIST Type: Mailing List, Third Party Advisory [geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12
Source: MLIST Type: Mailing List, Third Party Advisory [zookeeper-issues] 20200122 [jira] [Assigned] (ZOOKEEPER-3699) upgrade jackson-databind to address CVE-2019-20330
Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200220 [SECURITY] [DLA 2111-1] jackson-databind security update
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20200127-0004/
Source: CCN Type: IBM Security Bulletin 1284616 (Security Access Manager Appliance) Security vulnerabilities in the jackson-databind routines fixed in IBM Security Access Manager
Source: CCN Type: IBM Security Bulletin 2404185 (Cloud Object Storage System) Security vulnerability affects IBM Cloud Object Storage SDK Java (February 2020 Bulletin)
Source: CCN Type: IBM Security Bulletin 6128985 (Watson Discovery) IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in jackson-databind
Source: CCN Type: IBM Security Bulletin 6189573 (Curam SPM) Vulnerability in FasterXML Jackson libraries affect IBM Cram Social Program Management (CVE-2019-20330)
Source: CCN Type: IBM Security Bulletin 6208040 (Sterling B2B Integrator) Jackson-databind Security Vulnerability Affects IBM Sterling B2B Integrator (CVE-2019-20330)
Source: CCN Type: IBM Security Bulletin 6209044 (Global High Availability Mailbox) Multiple security vulnerabilities have been Identified In Jackson Databind library shipped with IBM Global Mailbox
Source: CCN Type: IBM Security Bulletin 6218918 (Network Performance Insight) The vanruability (net.sf.ehcache blocking in FasterXML jackson-databind has an unknown impact) found Network Performance Insight (CVE-2019-17571)
Source: CCN Type: IBM Security Bulletin 6221336 (Spectrum Protect Plus) Vulnerabilities in FasterXML jackson-databind affect IBM Spectrum Protect Plus (CVE-2020-9548, CVE-2020-9546. CVE-2020-9547, CVE-2020-8840, CVE-2019-20330)
Source: CCN Type: IBM Security Bulletin 6226398 (Event Streams) IBM Event Streams is affected by jackson-databind vulnerability CVE-2019-20330
Source: CCN Type: IBM Security Bulletin 6243446 (Data Risk Manager) IBM Data Risk Manager is affected by multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6255694 (Rational Rhapsody Design Manager) Multiple vulnerabilities affects IBM Jazz Foundation and IBM Engineering products.
Source: CCN Type: IBM Security Bulletin 6324739 (Security Guardium Insights) IBM Security Guardium Insights is affected by Components with known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6378366 (Cognos Business Intelligence) IBM Cognos Business Intelligence has addressed multiple vulnerabilities (Q12021)
Source: CCN Type: IBM Security Bulletin 6451705 (Cognos Analytics) IBM Cognos Analytics has addressed multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 6496727 (Sterling B2B Integrator) Jackson-Databind Vulnerabilities Affect the B2B API of IBM Sterling B2B Integrator
Source: CCN Type: IBM Security Bulletin 6528214 (Cloud Pak for Multicloud Management) IBM Cloud Pak for Multicloud Management Monitoring has patched several open source dependencies
Source: CCN Type: IBM Security Bulletin 6593435 (Process Mining) Vulnerability in jackson-databind affects IBM Process Mining (Multiple CVEs)
Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector) IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6828455 (z/Transaction Processing Facility) z/Transaction Processing Facility is affected by multiple vulnerabilities in the jackson-databind, jackson-dataformat-xml, jackson-core, slf4j-ext, and cxf-core packages
Source: CCN Type: IBM Security Bulletin 6840955 (Log Analysis) Multiple vulnerabilities in Data-Binding for Jackson shipped with IBM Operations Analytics - Log Analysis
Source: CCN Type: IBM Security Bulletin 6853637 (Sterling B2B Integrator) B2B API of IBM Sterling B2B Integrator is vulnerable to multiple issues due to FasterXML jackson-databind
Source: CCN Type: IBM Security Bulletin 6910171 (Integration Designer) Multiple CVEs affect IBM Integration Designer
Source: CCN Type: IBM Security Bulletin 6983482 (Security Verify Governance) IBM Security Verify Governance is vulnerable to a denial of service caused by multiple vulnerabilities.
Source: N/A Type: Patch, Third Party Advisory N/A
Source: CCN Type: Oracle CPUApr2020 Oracle Critical Patch Update Advisory - April 2020
Source: N/A Type: Third Party Advisory N/A
Source: MISC Type: Third Party Advisory https://www.oracle.com/security-alerts/cpujul2020.html
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2020.html
|
Vulnerable Configuration: | Configuration 1: cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.8.0 and < 2.8.11.5)OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.7.0 and < 2.7.9.7)OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.9.0 and < 2.9.10.2) Configuration 2: cpe:/a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*OR cpe:/a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*OR cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:*:*:*:*:*:*:*:* (Version >= 17.7 and <= 17.12)OR cpe:/a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*OR cpe:/a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*OR cpe:/a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*OR cpe:/a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*OR cpe:/a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:*OR cpe:/a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:* (Version < 11.2.0.3.23)OR cpe:/a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:* (Version >= 12.2.0.1.0 and < 12.2.0.1.19)OR cpe:/a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:* (Version >= 13.9.4.0.0 and < 13.9.4.2.1)OR cpe:/a:oracle:trace_file_analyzer:19c:*:*:*:*:*:*:*OR cpe:/a:oracle:trace_file_analyzer:18c:*:*:*:*:*:*:*OR cpe:/a:oracle:trace_file_analyzer:12.2.0.1:*:*:*:*:*:*:*OR cpe:/a:oracle:siebel_engineering_-_installer_&_deployment:*:*:*:*:*:*:*:* (Version <= 2.20.5)OR cpe:/a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:*OR cpe:/a:oracle:banking_platform:*:*:*:*:*:*:*:* (Version >= 2.4.0 and <= 2.9.0)OR cpe:/a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*OR cpe:/a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:* (Version >= 12.0.0 and <= 12.0.3)OR cpe:/a:oracle:customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*OR cpe:/a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*OR cpe:/a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:* (Version < 19.1.0.0.1)OR cpe:/a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:* (Version < 9.2.4.2)OR cpe:/a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* (Version < 9.2.4.2)OR cpe:/a:oracle:retail_merchandising_system:15.0.3:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_merchandising_system:16.0.2:*:*:*:*:*:*:*OR cpe:/a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*OR cpe:/a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:* (Version <= 20.5)OR cpe:/a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:* Configuration 3: cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:* Configuration 4: cpe:/a:netapp:snapcenter:-:*:*:*:*:*:*:*OR cpe:/a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*OR cpe:/a:netapp:service_level_manager:-:*:*:*:*:*:*:*OR cpe:/a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*OR cpe:/a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* (Version >= 7.3OR cpe:/a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* (Version >= 9.5OR cpe:/a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:* (Version >= 7.3 Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:fasterxml:jackson-databind:2.9.10.1:*:*:*:*:*:*:*AND cpe:/a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_analytics:11.0:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_analytics:11.1:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:watson_discovery:2.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:watson_discovery:2.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.5:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.2.3:*:*:*:*:*:*:*OR cpe:/a:ibm:event_streams:2019.4.1:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.5.3:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.6.0:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:data_risk_manager:2.0.6.2:*:*:*:*:*:*:*OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:log_analysis:1.3.6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:*OR cpe:/a:ibm:integration_designer:20.0.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.1.1.0:*:*:*:standard:*:*:*OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.1.2.0:*:*:*:standard:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
fasterxml jackson-databind *
fasterxml jackson-databind *
fasterxml jackson-databind *
oracle retail xstore point of service 15.0
oracle primavera unifier 16.2
oracle primavera unifier 16.1
oracle weblogic server 12.2.1.3.0
oracle webcenter portal 12.2.1.3.0
oracle retail xstore point of service 16.0
oracle primavera unifier 18.8
oracle primavera unifier *
oracle weblogic server 12.2.1.4.0
oracle enterprise manager base platform 13.3.0.0
oracle primavera unifier 19.12
oracle webcenter portal 12.2.1.4.0
oracle enterprise manager base platform 13.4.0.0
oracle communications instant messaging server 10.0.1.4.0
oracle retail xstore point of service 17.0
oracle retail xstore point of service 18.0
oracle retail xstore point of service 19.0
oracle communications billing and revenue management 12.0.0.3.0
oracle communications billing and revenue management 7.5.0.23.0
oracle global lifecycle management opatch *
oracle global lifecycle management opatch *
oracle global lifecycle management opatch *
oracle trace file analyzer 19c
oracle trace file analyzer 18c
oracle trace file analyzer 12.2.0.1
oracle siebel engineering - installer & deployment *
oracle retail sales audit 14.1
oracle banking platform *
oracle communications contacts server 8.0.0.4.0
oracle communications evolved communications application server 7.1
oracle communications network charging and control 6.0.1
oracle communications network charging and control *
oracle customer management and segmentation foundation 18.0
oracle goldengate application adapters 19.1.0.0.0
oracle goldengate stream analytics *
oracle jd edwards enterpriseone orchestrator *
oracle jd edwards enterpriseone tools *
oracle retail merchandising system 15.0.3
oracle retail merchandising system 16.0.2
oracle retail merchandising system 16.0.3
oracle siebel ui framework *
oracle communications cloud native core network slice selection function 1.2.1
debian debian linux 8.0
netapp snapcenter -
netapp steelstore cloud integrated storage -
netapp service level manager -
netapp oncommand api services -
netapp active iq unified manager *
netapp active iq unified manager *
netapp active iq unified manager *
fasterxml jackson-databind 2.9.10.1
ibm cognos business intelligence 10.2.2
ibm cognos analytics 11.0
ibm rational rhapsody design manager 6.0.2
ibm spectrum protect plus 10.1.0
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm sterling b2b integrator 6.0.1.0
ibm cognos analytics 11.1
ibm event streams 2019.2.1
ibm watson discovery 2.0.0
ibm spectrum protect plus 10.1.5
ibm watson discovery 2.1.1
ibm data risk manager 2.0.1
ibm data risk manager 2.0.2
ibm data risk manager 2.0.3
ibm data risk manager 2.0.4
ibm data risk manager 2.0.5
ibm data risk manager 2.0.6
ibm sterling b2b integrator 6.0.3.1
ibm event streams 2019.2.2
ibm event streams 2019.2.3
ibm event streams 2019.4.1
ibm log analysis 1.3.5.3
ibm log analysis 1.3.6.0
ibm data risk manager 2.0.6.1
ibm data risk manager 2.0.6.2
ibm security guardium insights 2.0.1
ibm log analysis 1.3.6.1
ibm sterling b2b integrator 6.1.0.0
ibm integration designer 20.0.0.2
ibm sterling b2b integrator 6.1.1.0
ibm security verify governance 10.0
ibm sterling b2b integrator 6.1.2.0