CVE-2021-22112
Data ?
Vulnerability ID | CVE-2021-22112 |
---|---|
Published on | 23.02.2021 19:15 |
Severity | HIGH |
Vulnerable configurations ?
- cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*, cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*, cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*, cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_interactive_session_recorder:6.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:hospitality_cruise_shipboard_property_management_system:20.1.0:*:*:*:*:*:*:*
-
cpe:2.3:a:oracle:insurance_policy_administration:11.2.0:*:*:*:*:*:*:*
… - cpe:2.3:a:oracle:insurance_policy_administration:11.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:mysql_enterprise_monitor:-:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:2.3.14:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.0.4:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.0.25:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.0:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.2:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.3:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.3.7856:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.4:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.5:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.6:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.6.8003:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.1.7:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.0:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.2:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.3:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.4:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.5:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.6:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.7:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.8:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.8.2223:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.9:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.10:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.2.1182:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.0:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.2:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.2.1162:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.3:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.4:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.4.3247:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.5:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.6:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.6.3293:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.7:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.8:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.3.9:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.0:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.2:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.2.4181:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.3:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.4:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.4.4226:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.5:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.6:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.7:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.7.4297:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.8:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.9:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.9.4237:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:3.4.10:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.0:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.0.5135:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.2:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.3:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.4:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.4.5235:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.5:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.6:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.6.5281:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.7:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.8:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.11.5331:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.0.12:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:4.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.0:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.0.8131:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.1:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.2:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.2.8191:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.3:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.14:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.18.1217:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.20:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.21:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.22:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.23:*:*:*:*:*:*:*, cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:spring_security:-:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.1.0:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.1.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.1.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.1.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.1.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.1.5:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.0:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.5:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.6:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.7:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.8:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.9:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:3.2.10:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.0:-:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.0:milestone1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.0:milestone2:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.0:rc1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.0:rc2:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.0.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.1.0:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.1.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.1.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.1.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.1.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.0:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.0:milestone1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.0:rc1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.0:release:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.1:release:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.2:release:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.5:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.6:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.7:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.9:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.10:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.11:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.12:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.13:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.14:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.15:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:4.2.16:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.0:-:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.0:m1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.0:milestone1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.0:milestone2:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.0:milestone3:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.0:milestone4:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.0:milestone5:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.0:rc1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.5:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.6:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.7:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.8:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.9:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.10:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.11:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.12:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.13:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.14:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.15:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.0.16:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.0:-:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.0:milestone1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.0:milestone2:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.0:rc1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.0:rc2:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.5:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.6:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.7:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.8:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.9:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.1.10:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.0:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.0:-:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.0:milestone1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.0:milestone2:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.0:milestone3:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.0:milestone4:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.0:rc1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.5:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.6:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.7:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:spring_security:5.3.0:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.0:-:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.0:milestone1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.0:rc1:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.1:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.2:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.3:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.4:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.5:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.6:*:*:*:*:*:*:*, cpe:2.3:a:pivotal_software:spring_security:5.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_security:5.4.0:*:*:*:*:*:*:*, cpe:2.3:a:vmware:spring_security:5.4.0:-:*:*:*:*:*:*, cpe:2.3:a:vmware:spring_security:5.4.0:milestone1:*:*:*:*:*:*, cpe:2.3:a:vmware:spring_security:5.4.0:milestone2:*:*:*:*:*:*, cpe:2.3:a:vmware:spring_security:5.4.0:rc1:*:*:*:*:*:*, cpe:2.3:a:vmware:spring_security:5.4.1:*:*:*:*:*:*:*, cpe:2.3:a:vmware:spring_security:5.4.2:*:*:*:*:*:*:*, cpe:2.3:a:vmware:spring_security:5.4.3:*:*:*:*:*:*:*
Vulnerable certificates ?
This CVE has no assigned vulnerable CC or FIPS certificates.
Looking for more?
Explore the landscape of Common Criteria and FIPS 140 certificates.
Notification subscription
You currently have no selected certificates. Either add certificates from their page to the selection or subscribe to receive notifications of new certificates below.
Your subscription request was successfully received. You will need to confirm your subscription by clicking a confirmation link in an email that will be sent to you shortly. Notifications will be sent to you only after confirmation. If you do not confirm your subscription within 7 days, the subscription request will expire. If you already have a subscription, it will be updated with the new certificates, but you will need to reconfirm it.
Compare certificates
You currently have no selected certificates for comparison. Add certificates on the page of the certificate. After you do so you will be able to see them here and compare them.