Search for vulnerabilities
Vulnerability details: VCID-95nw-fscc-aaaa
Vulnerability ID VCID-95nw-fscc-aaaa
Aliases CVE-2021-40690
GHSA-j8wc-gxx9-82hx
Summary Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2021:4679
rhas Moderate https://access.redhat.com/errata/RHSA-2021:5149
rhas Moderate https://access.redhat.com/errata/RHSA-2021:5150
rhas Moderate https://access.redhat.com/errata/RHSA-2021:5151
rhas Moderate https://access.redhat.com/errata/RHSA-2021:5154
rhas Moderate https://access.redhat.com/errata/RHSA-2021:5170
rhas Moderate https://access.redhat.com/errata/RHSA-2022:0146
rhas Important https://access.redhat.com/errata/RHSA-2022:0151
rhas Important https://access.redhat.com/errata/RHSA-2022:0152
rhas Important https://access.redhat.com/errata/RHSA-2022:0155
rhas Important https://access.redhat.com/errata/RHSA-2022:0164
rhas Moderate https://access.redhat.com/errata/RHSA-2022:1013
rhas Important https://access.redhat.com/errata/RHSA-2022:5532
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-40690.json
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00108 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00185 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00185 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00185 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00185 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00185 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00185 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00185 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.0019 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00216 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00216 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00216 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00345 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.00353 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
epss 0.02179 https://api.first.org/data/v1/epss?cve=CVE-2021-40690
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2011190
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-j8wc-gxx9-82hx
cvssv3.1 7.5 https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2021-40690
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-40690
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-40690
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20230818-0002
generic_textual HIGH https://security.netapp.com/advisory/ntap-20230818-0002
cvssv3.1 7.5 https://www.debian.org/security/2021/dsa-5010
generic_textual HIGH https://www.debian.org/security/2021/dsa-5010
cvssv3.1 5.3 https://www.oracle.com/security-alerts/cpuapr2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpuapr2022.html
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpujul2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpujul2022.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-40690.json
https://api.first.org/data/v1/epss?cve=CVE-2021-40690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40690
https://issues.apache.org/jira/browse/CXF-8613
https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E
https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59%40%3Cissues.cxf.apache.org%3E
https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E
https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E
https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8%40%3Cuser.poi.apache.org%3E
https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8%40%3Ccommits.tomee.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html
https://security.netapp.com/advisory/ntap-20230818-0002
https://security.netapp.com/advisory/ntap-20230818-0002/
https://www.debian.org/security/2021/dsa-5010
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
2011190 https://bugzilla.redhat.com/show_bug.cgi?id=2011190
994569 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994569
cpe:2.3:a:apache:cxf:3.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cxf:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:xml_security_for_java:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xml_security_for_java:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_service_backbone:19.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_service_backbone:19.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2021-40690 https://nvd.nist.gov/vuln/detail/CVE-2021-40690
GHSA-j8wc-gxx9-82hx https://github.com/advisories/GHSA-j8wc-gxx9-82hx
RHSA-2021:4679 https://access.redhat.com/errata/RHSA-2021:4679
RHSA-2021:5149 https://access.redhat.com/errata/RHSA-2021:5149
RHSA-2021:5150 https://access.redhat.com/errata/RHSA-2021:5150
RHSA-2021:5151 https://access.redhat.com/errata/RHSA-2021:5151
RHSA-2021:5154 https://access.redhat.com/errata/RHSA-2021:5154
RHSA-2021:5170 https://access.redhat.com/errata/RHSA-2021:5170
RHSA-2022:0146 https://access.redhat.com/errata/RHSA-2022:0146
RHSA-2022:0151 https://access.redhat.com/errata/RHSA-2022:0151
RHSA-2022:0152 https://access.redhat.com/errata/RHSA-2022:0152
RHSA-2022:0155 https://access.redhat.com/errata/RHSA-2022:0155
RHSA-2022:0164 https://access.redhat.com/errata/RHSA-2022:0164
RHSA-2022:0501 https://access.redhat.com/errata/RHSA-2022:0501
RHSA-2022:1013 https://access.redhat.com/errata/RHSA-2022:1013
RHSA-2022:5532 https://access.redhat.com/errata/RHSA-2022:5532
RHSA-2022:6407 https://access.redhat.com/errata/RHSA-2022:6407
RHSA-2025:4226 https://access.redhat.com/errata/RHSA-2025:4226
USN-5525-1 https://usn.ubuntu.com/5525-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-40690.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-40690
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-40690
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-40690
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20230818-0002
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.debian.org/security/2021/dsa-5010
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpujul2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.44608
EPSS Score 0.00108
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.