U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-17495

Change History

Modified Analysis by NIST 4/06/2022 2:05:13 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:oracle:banking_apis:*:*:*:*:*:*:*:* versions from (including) 18.1 up to (including) 18.3
     *cpe:2.3:a:oracle:banking_apis:19.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_apis:19.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_apis:20.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_apis:21.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_digital_experience:*:*:*:*:*:*:*:* versions from (including) 18.1 up to (including) 18.3
     *cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_digital_experience:21.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (including) 2.10.0
     *cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 16.2.0 up to (including) 16.2.11
     *cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* versions from (including) 17.12.0 up to (including) 17.12.8
     *cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*
Added CWE

								
							
							
						
NIST CWE-352
Removed CWE
NIST CWE-79

								
						
Changed Reference Type
https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E Mailing List, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E Mailing List, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E Mailing List, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E Mailing List, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E Mailing List, Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpuApr2021.html No Types Assigned
https://www.oracle.com/security-alerts/cpuApr2021.html Patch, Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpujan2022.html No Types Assigned
https://www.oracle.com/security-alerts/cpujan2022.html Patch, Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpuoct2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpuoct2020.html Patch, Third Party Advisory