U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-25329

Change History

Modified Analysis by NIST 12/07/2021 4:10:24 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:database:12.2.0.1:*:*:*:enterprise:*:*:*
     *cpe:2.3:a:oracle:database:19c:*:*:*:enterprise:*:*:*
     *cpe:2.3:a:oracle:database:21c:*:*:*:enterprise:*:*:*
     *cpe:2.3:a:oracle:graph_server_and_client:*:*:*:*:*:*:*:* versions up to (excluding) 21.3.0
     *cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:managed_file_transfer:12.2.1.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions up to (including) 8.0.23
     *cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:* versions up to (excluding) 21.9
     *cpe:2.3:a:oracle:siebel_ui_framework:21.9:*:*:*:*:*:*:*
Changed Reference Type
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E Mailing List, Vendor Advisory
Changed Reference Type
https://www.oracle.com//security-alerts/cpujul2021.html No Types Assigned
https://www.oracle.com//security-alerts/cpujul2021.html Patch, Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpuoct2021.html No Types Assigned
https://www.oracle.com/security-alerts/cpuoct2021.html Patch, Third Party Advisory