U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-17563

Change History

Modified Analysis by NIST 10/07/2022 9:39:32 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:* versions from (including) 17.1 up to (including) 17.3
     *cpe:2.3:a:oracle:micros_relate_crm_software:11.4:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions up to (including) 4.0.11.5331
     *cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (including) 8.0.18.1217
     *cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Changed Reference Type
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E Patch, Vendor Advisory
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E Patch, Vendor Advisory
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E Mailing List, Patch, Vendor Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html Mailing List, Third Party Advisory
Changed Reference Type
https://security.gentoo.org/glsa/202003-43 No Types Assigned
https://security.gentoo.org/glsa/202003-43 Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2020/dsa-4680 No Types Assigned
https://www.debian.org/security/2020/dsa-4680 Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpuapr2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpuapr2020.html Patch, Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpujan2021.html No Types Assigned
https://www.oracle.com/security-alerts/cpujan2021.html Patch, Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpujul2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpujul2020.html Patch, Third Party Advisory