This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Oracle First view 2017-10-03
Product Retail Returns Management Last view 2021-12-18
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:* 19
cpe:2.3:a:oracle:retail_returns_management:14.0:*:*:*:*:*:*:* 8
cpe:2.3:a:oracle:retail_returns_management:2.3.8:*:*:*:*:*:*:* 2
cpe:2.3:a:oracle:retail_returns_management:2.4.9:*:*:*:*:*:*:* 2
cpe:2.3:a:oracle:retail_returns_management:14.0.4:*:*:*:*:*:*:* 2
cpe:2.3:a:oracle:retail_returns_management:14.1.3:*:*:*:*:*:*:* 2

Related : CVE

  Date Alert Description
5.9 2021-12-18 CVE-2021-45105

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

5.1 2021-07-21 CVE-2021-2351

Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: "Changes in Native Network Encryption with the July 2021 Critical Patch Update" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).

6.1 2021-07-19 CVE-2021-35043

OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character.

8.2 2021-02-24 CVE-2020-11987

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

7.5 2020-11-12 CVE-2019-17566

Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

6.5 2020-09-19 CVE-2020-5421

In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.

6.3 2020-05-14 CVE-2020-1945

Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.

6.1 2020-04-29 CVE-2020-11022

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

7.5 2020-01-17 CVE-2020-5398

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.

5.3 2020-01-17 CVE-2020-5397

Spring Framework, versions 5.2.x prior to 5.2.3 are vulnerable to CSRF attacks through CORS preflight requests that target Spring MVC (spring-webmvc module) or Spring WebFlux (spring-webflux module) endpoints. Only non-authenticated endpoints are vulnerable because preflight requests should not include credentials and therefore requests should fail authentication. However a notable exception to this are Chrome based browsers when using client certificates for authentication since Chrome sends TLS client certificates in CORS preflight requests in violation of spec requirements. No HTTP body can be sent or received as a result of this attack.

6.1 2019-11-08 CVE-2019-10219

A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.

7.3 2019-08-20 CVE-2019-10086

In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.

9.8 2019-07-26 CVE-2019-13990

initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.

6.1 2019-04-19 CVE-2019-11358

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

9.8 2018-05-24 CVE-2018-8013

In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.

8.8 2018-05-11 CVE-2018-1258

Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.

6.5 2018-04-18 CVE-2018-2737

Vulnerability in the Oracle Retail Returns Management component of Oracle Retail Applications (subcomponent: Security). Supported versions that are affected are 2.3.8, 2.4.9, 14.0.4 and 14.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Returns Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Returns Management accessible data as well as unauthorized read access to a subset of Oracle Retail Returns Management accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).

7.5 2018-04-06 CVE-2018-1272

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

5.9 2018-04-06 CVE-2018-1271

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.

9.8 2018-04-06 CVE-2018-1270

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack.

8.1 2017-10-03 CVE-2017-12617

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CWE : Common Weakness Enumeration

%idName
15% (2) CWE-502 Deserialization of Untrusted Data
15% (2) CWE-20 Improper Input Validation
7% (1) CWE-674 Uncontrolled Recursion
7% (1) CWE-668 Exposure of Resource to Wrong Sphere
7% (1) CWE-611 Information Leak Through XML External Entity File Disclosure
7% (1) CWE-494 Download of Code Without Integrity Check
7% (1) CWE-434 Unrestricted Upload of File with Dangerous Type
7% (1) CWE-384 Session Fixation
7% (1) CWE-352 Cross-Site Request Forgery (CSRF)
7% (1) CWE-327 Use of a Broken or Risky Cryptographic Algorithm
7% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')

SAINT Exploits

Description Link
Apache Tomcat PUT method JSP upload More info here

Snort® IPS/IDS

Date Description
2017-11-09 Apache Tomcat remote JSP file upload attempt
RuleID : 44531 - Type : SERVER-APACHE - Revision : 3

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-168af81706.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-3080.nasl - Type: ACT_GATHER_INFO
2018-06-11 Name: The remote Fedora host is missing a security update.
File: fedora_2018-79792e0c64.nasl - Type: ACT_GATHER_INFO
2018-06-05 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4215.nasl - Type: ACT_GATHER_INFO
2018-05-29 Name: The remote Debian host is missing a security update.
File: debian_DLA-1385.nasl - Type: ACT_GATHER_INFO
2018-01-17 Name: A web application running on the remote host is affected by multiple vulnerab...
File: mysql_enterprise_monitor_4_0_2_5168.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-ebb76fc3c9.nasl - Type: ACT_GATHER_INFO
2017-12-04 Name: An HTTP server running on the remote host is affected by a remote arbitrary f...
File: tomcat_put_jsp.nasl - Type: ACT_ATTACK
2017-11-27 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1299.nasl - Type: ACT_GATHER_INFO
2017-11-13 Name: The remote Fedora host is missing a security update.
File: fedora_2017-f499ee7b12.nasl - Type: ACT_GATHER_INFO
2017-11-13 Name: The remote Fedora host is missing a security update.
File: fedora_2017-ef7c118dbc.nasl - Type: ACT_GATHER_INFO
2017-11-08 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-3113.nasl - Type: ACT_GATHER_INFO
2017-11-02 Name: The remote Apache Tomcat server is affected by a code execution vulnerability.
File: tomcat_6_0_24.nasl - Type: ACT_GATHER_INFO
2017-11-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1261.nasl - Type: ACT_GATHER_INFO
2017-11-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2017-1262.nasl - Type: ACT_GATHER_INFO
2017-10-31 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20171030_tomcat_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2017-10-31 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20171030_tomcat6_on_SL6_x.nasl - Type: ACT_GATHER_INFO
2017-10-31 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2017-3081.nasl - Type: ACT_GATHER_INFO
2017-10-31 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2017-3080.nasl - Type: ACT_GATHER_INFO
2017-10-30 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-3081.nasl - Type: ACT_GATHER_INFO
2017-10-30 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2017-3080.nasl - Type: ACT_GATHER_INFO
2017-10-30 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2017-3081.nasl - Type: ACT_GATHER_INFO
2017-10-30 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2017-3080.nasl - Type: ACT_GATHER_INFO
2017-10-27 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2017-913.nasl - Type: ACT_GATHER_INFO
2017-10-11 Name: The remote Apache Tomcat server is affected by a code execution vulnerability.
File: tomcat_7_0_82.nasl - Type: ACT_GATHER_INFO