Known Vulnerabilities for Agile Plm by Oracle

Listed below are 10 of the newest known vulnerabilities associated with "Agile Plm" by "Oracle".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-23437 There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document paylo... 6.5 - MEDIUM 2022-01-24 2022-12-07
CVE-2022-21467 Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Attachments). The supported version that is ... 6.5 - MEDIUM 2022-04-19 2022-04-28
CVE-2021-29425 In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../f... 4.8 - MEDIUM 2021-04-13 2022-10-27
CVE-2021-26272 It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like... 6.5 - MEDIUM 2021-01-26 2022-03-01
CVE-2021-26271 It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted text int... 6.5 - MEDIUM 2021-01-26 2021-12-01
CVE-2021-25329 The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 o... 7 - HIGH 2021-03-01 2022-10-27
CVE-2021-25122 When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8... 7.5 - HIGH 2021-03-01 2022-10-25
CVE-2021-24122 When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0... 5.9 - MEDIUM 2021-01-14 2022-10-24
CVE-2021-3572 A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly u... 5.7 - MEDIUM 2021-11-10 2022-10-05
CVE-2021-2351 Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are... 8.3 - HIGH 2021-07-21 2022-10-06

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOracleAgile Plm9.3.6AllAllAll
ApplicationOracleAgile Plm9.3.5AllAllAll
ApplicationOracleAgile Plm9.3.4AllAllAll
ApplicationOracleAgile Plm9.3.3AllAllAll

Popular searches for Agile Plm

Product Lifecycle Management (PLM) Software | Oracle

Product Lifecycle Management PLM Software | Oracle Product Lifecycle Management PLM W U S software that helps businesses rapidly design and launch new products? Learn how Oracle IoT data to make your new product development and introduction processes more resilient, and drive faster, high-quality innovation. Product lifecycle Product (business) Innovation New product development Oracle Corporation Siemens PLM Software Design Internet of things Data Business process Oracle Cloud Oracle Database Supply chain Quality (business) Manufacturing Cloud computing Enterprise resource planning Process (computing) Computer-aided design Application software

Agile PLM Support, Maintenance and Management | Rimini Street

A =Agile PLM Support, Maintenance and Management | Rimini Street Rimini Street offers Agile maintenance support fees. Agile software development Product lifecycle Oracle Corporation Software maintenance Technical support Information technology Business Oracle Database Maintenance (technical) Managed services Cloud computing Technology roadmap Third-party software component Software Application software Client (computing) Siemens PLM Software Customer Database Datasheet

© 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status