U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-43797

Change History

Modified Analysis by NIST 2/24/2023 10:47:11 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:helidon:1.4.10:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:helidon:2.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:oracle:banking_deposits_and_lines_of_credit_servicing:2.7:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_party_management:2.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:helidon:1.4.10:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:helidon:2.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html Mailing List, Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2023/dsa-5316 No Types Assigned
https://www.debian.org/security/2023/dsa-5316 Third Party Advisory
Changed Reference Type
https://www.oracle.com/security-alerts/cpujul2022.html No Types Assigned
https://www.oracle.com/security-alerts/cpujul2022.html Patch, Third Party Advisory