cvelist/2016/0xxx/CVE-2016-0635.json

142 lines
7.9 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-04-23 19:00:50 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2016-0635",
"STATE": "PUBLIC"
2019-03-18 06:58:55 +00:00
},
2019-04-23 19:00:50 +00:00
"affects": {
"vendor": {
"vendor_data": [
2019-03-18 06:58:55 +00:00
{
2019-04-23 19:00:50 +00:00
"product": {
"product_data": [
2019-03-18 06:58:55 +00:00
{
2019-04-23 19:00:50 +00:00
"product_name": "n/a",
"version": {
"version_data": [
2019-03-18 06:58:55 +00:00
{
2019-04-23 19:00:50 +00:00
"version_value": "n/a"
2019-03-18 06:58:55 +00:00
}
]
}
}
]
},
2019-04-23 19:00:50 +00:00
"vendor_name": "n/a"
2019-03-18 06:58:55 +00:00
}
2019-01-16 14:04:51 -05:00
]
2019-03-18 06:58:55 +00:00
}
},
2019-04-23 19:00:50 +00:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the Enterprise Manager Ops Center component in Oracle Enterprise Manager Grid Control 12.1.4, 12.2.2, and 12.3.2; the Oracle Health Sciences Information Manager component in Oracle Health Sciences Applications 1.2.8.3, 2.0.2.3, and 3.0.1.0; the Oracle Healthcare Master Person Index component in Oracle Health Sciences Applications 2.0.12, 3.0.0, and 4.0.1; the Oracle Documaker component in Oracle Insurance Applications before 12.5; the Oracle Insurance Calculation Engine component in Oracle Insurance Applications 9.7.1, 10.1.2, and 10.2.2; the Oracle Insurance Policy Administration J2EE and Oracle Insurance Rules Palette components in Oracle Insurance Applications 9.6.1, 9.7.1, 10.0.1, 10.1.2, 10.2.0, and 10.2.2; the Oracle Retail Integration Bus component in Oracle Retail Applications 15.0; the Oracle Retail Order Broker component in Oracle Retail Applications 5.1, 5.2, and 15.0; the Primavera Contract Management component in Oracle Primavera Products Suite 14.2; the Primavera P6 Enterprise Project Portfolio Management component in Oracle Primavera Products Suite 8.2, 8.3, 8.4, 15.1, 15.2, and 16.1; the Oracle Financial Services Analytical Applications Infrastructure component in Oracle Financial Services Applications 8.0.0, 8.0.1, 8.0.2, and 8.0.3; the Oracle Commerce Guided Search / Oracle Commerce Experience Manager component in Oracle Commerce 3.1.1, 3.1.2, 11.0, 11.1, and 11.2; the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5; the Oracle Communications BRM - Elastic Charging Engine 11.2.0.0.0 and 11.3.0.0.0; the Oracle Enterprise Repository Enterprise Repository 12.1.3.0.0; the Oracle Financial Services Behavior Detection Platform 8.0.1 and 8.0.2; the Oracle Hyperion Essbase 12.2.1.1; the Oracle Tuxedo System and Applications Monitor (TSAM) 11.1.1.2.0, 11.1.1.2.1, 11.1.1.2.1, 12.1.1.1.0, 12.1.3.0.0, and 12.2.2.0.0; the Oracle Communications WebRTC Session Controller component of Oracle Communications Applications (subcomponent: Security (Spring)) 7.0, 7.1 and 7.2; the Oracle Endeca Information Discovery Integrator 3.2; the Converged Commerce component of Oracle Retail Applications 16.0.1; the Oracle Identity Manager 11.1.2.3.0; Oracle Enterprise Manager for MySQL Database 12.1.0.4; Oracle Retail Invoice Matching 12.0, 13.0, 13.1, 13.2, 14.0, and 14.1; Oracle Communications Performance Intelligence Center (PIC) Software Prior to 10.2.1 and the Oracle Knowledge component of Oracle Siebel CRM (subcomponent: AnswerFlow (Spring Framework)) version 8.5.1.0 - 8.5.1.7 and 8.6.0 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors."
2019-03-18 06:58:55 +00:00
}
]
},
2019-04-23 19:00:50 +00:00
"problemtype": {
"problemtype_data": [
2019-03-18 06:58:55 +00:00
{
2019-04-23 19:00:50 +00:00
"description": [
2019-03-18 06:58:55 +00:00
{
2019-04-23 19:00:50 +00:00
"lang": "eng",
"value": "n/a"
2019-03-18 06:58:55 +00:00
}
]
}
]
},
2019-04-23 19:00:50 +00:00
"references": {
"reference_data": [
2019-03-18 06:58:55 +00:00
{
2019-04-23 19:00:50 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "91869",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91869"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "1036397",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036397"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "1037640",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037640"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "1036377",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036377"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "1036378",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036378"
2019-03-18 06:58:55 +00:00
},
{
2019-04-23 19:00:50 +00:00
"name": "1036393",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036393"
Bill Situ <Bill.Situ@Oracle.com> This update includes Oracle assigned CVEs released in Oracle Critical Patch Update 2019 April. On branch cna/Oracle/CPU2019Apr Changes to be committed: modified: 2016/0xxx/CVE-2016-0635.json modified: 2018/2xxx/CVE-2018-2880.json modified: 2018/3xxx/CVE-2018-3120.json modified: 2018/3xxx/CVE-2018-3123.json modified: 2018/3xxx/CVE-2018-3312.json modified: 2018/3xxx/CVE-2018-3314.json modified: 2019/2xxx/CVE-2019-2424.json modified: 2019/2xxx/CVE-2019-2516.json modified: 2019/2xxx/CVE-2019-2517.json modified: 2019/2xxx/CVE-2019-2518.json modified: 2019/2xxx/CVE-2019-2551.json modified: 2019/2xxx/CVE-2019-2557.json modified: 2019/2xxx/CVE-2019-2558.json modified: 2019/2xxx/CVE-2019-2564.json modified: 2019/2xxx/CVE-2019-2565.json modified: 2019/2xxx/CVE-2019-2566.json modified: 2019/2xxx/CVE-2019-2567.json modified: 2019/2xxx/CVE-2019-2568.json modified: 2019/2xxx/CVE-2019-2570.json modified: 2019/2xxx/CVE-2019-2571.json modified: 2019/2xxx/CVE-2019-2572.json modified: 2019/2xxx/CVE-2019-2573.json modified: 2019/2xxx/CVE-2019-2574.json modified: 2019/2xxx/CVE-2019-2575.json modified: 2019/2xxx/CVE-2019-2576.json modified: 2019/2xxx/CVE-2019-2577.json modified: 2019/2xxx/CVE-2019-2578.json modified: 2019/2xxx/CVE-2019-2579.json modified: 2019/2xxx/CVE-2019-2580.json modified: 2019/2xxx/CVE-2019-2581.json modified: 2019/2xxx/CVE-2019-2582.json modified: 2019/2xxx/CVE-2019-2583.json modified: 2019/2xxx/CVE-2019-2584.json modified: 2019/2xxx/CVE-2019-2585.json modified: 2019/2xxx/CVE-2019-2586.json modified: 2019/2xxx/CVE-2019-2587.json modified: 2019/2xxx/CVE-2019-2588.json modified: 2019/2xxx/CVE-2019-2589.json modified: 2019/2xxx/CVE-2019-2590.json modified: 2019/2xxx/CVE-2019-2591.json modified: 2019/2xxx/CVE-2019-2592.json modified: 2019/2xxx/CVE-2019-2593.json modified: 2019/2xxx/CVE-2019-2594.json modified: 2019/2xxx/CVE-2019-2595.json modified: 2019/2xxx/CVE-2019-2596.json modified: 2019/2xxx/CVE-2019-2597.json modified: 2019/2xxx/CVE-2019-2598.json modified: 2019/2xxx/CVE-2019-2600.json modified: 2019/2xxx/CVE-2019-2601.json modified: 2019/2xxx/CVE-2019-2602.json modified: 2019/2xxx/CVE-2019-2603.json modified: 2019/2xxx/CVE-2019-2604.json modified: 2019/2xxx/CVE-2019-2605.json modified: 2019/2xxx/CVE-2019-2606.json modified: 2019/2xxx/CVE-2019-2607.json modified: 2019/2xxx/CVE-2019-2608.json modified: 2019/2xxx/CVE-2019-2609.json modified: 2019/2xxx/CVE-2019-2610.json modified: 2019/2xxx/CVE-2019-2611.json modified: 2019/2xxx/CVE-2019-2612.json modified: 2019/2xxx/CVE-2019-2613.json modified: 2019/2xxx/CVE-2019-2614.json modified: 2019/2xxx/CVE-2019-2615.json modified: 2019/2xxx/CVE-2019-2616.json modified: 2019/2xxx/CVE-2019-2617.json modified: 2019/2xxx/CVE-2019-2618.json modified: 2019/2xxx/CVE-2019-2619.json modified: 2019/2xxx/CVE-2019-2620.json modified: 2019/2xxx/CVE-2019-2621.json modified: 2019/2xxx/CVE-2019-2622.json modified: 2019/2xxx/CVE-2019-2623.json modified: 2019/2xxx/CVE-2019-2624.json modified: 2019/2xxx/CVE-2019-2625.json modified: 2019/2xxx/CVE-2019-2626.json modified: 2019/2xxx/CVE-2019-2627.json modified: 2019/2xxx/CVE-2019-2628.json modified: 2019/2xxx/CVE-2019-2629.json modified: 2019/2xxx/CVE-2019-2630.json modified: 2019/2xxx/CVE-2019-2631.json modified: 2019/2xxx/CVE-2019-2632.json modified: 2019/2xxx/CVE-2019-2633.json modified: 2019/2xxx/CVE-2019-2634.json modified: 2019/2xxx/CVE-2019-2635.json modified: 2019/2xxx/CVE-2019-2636.json modified: 2019/2xxx/CVE-2019-2637.json modified: 2019/2xxx/CVE-2019-2638.json modified: 2019/2xxx/CVE-2019-2639.json modified: 2019/2xxx/CVE-2019-2640.json modified: 2019/2xxx/CVE-2019-2641.json modified: 2019/2xxx/CVE-2019-2642.json modified: 2019/2xxx/CVE-2019-2643.json modified: 2019/2xxx/CVE-2019-2644.json modified: 2019/2xxx/CVE-2019-2645.json modified: 2019/2xxx/CVE-2019-2646.json modified: 2019/2xxx/CVE-2019-2647.json modified: 2019/2xxx/CVE-2019-2648.json modified: 2019/2xxx/CVE-2019-2649.json modified: 2019/2xxx/CVE-2019-2650.json modified: 2019/2xxx/CVE-2019-2651.json modified: 2019/2xxx/CVE-2019-2652.json modified: 2019/2xxx/CVE-2019-2653.json modified: 2019/2xxx/CVE-2019-2654.json modified: 2019/2xxx/CVE-2019-2655.json modified: 2019/2xxx/CVE-2019-2656.json modified: 2019/2xxx/CVE-2019-2657.json modified: 2019/2xxx/CVE-2019-2658.json modified: 2019/2xxx/CVE-2019-2659.json modified: 2019/2xxx/CVE-2019-2660.json modified: 2019/2xxx/CVE-2019-2661.json modified: 2019/2xxx/CVE-2019-2662.json modified: 2019/2xxx/CVE-2019-2663.json modified: 2019/2xxx/CVE-2019-2664.json modified: 2019/2xxx/CVE-2019-2665.json modified: 2019/2xxx/CVE-2019-2669.json modified: 2019/2xxx/CVE-2019-2670.json modified: 2019/2xxx/CVE-2019-2671.json modified: 2019/2xxx/CVE-2019-2673.json modified: 2019/2xxx/CVE-2019-2674.json modified: 2019/2xxx/CVE-2019-2675.json modified: 2019/2xxx/CVE-2019-2676.json modified: 2019/2xxx/CVE-2019-2677.json modified: 2019/2xxx/CVE-2019-2678.json modified: 2019/2xxx/CVE-2019-2679.json modified: 2019/2xxx/CVE-2019-2680.json modified: 2019/2xxx/CVE-2019-2681.json modified: 2019/2xxx/CVE-2019-2682.json modified: 2019/2xxx/CVE-2019-2683.json modified: 2019/2xxx/CVE-2019-2684.json modified: 2019/2xxx/CVE-2019-2685.json modified: 2019/2xxx/CVE-2019-2686.json modified: 2019/2xxx/CVE-2019-2687.json modified: 2019/2xxx/CVE-2019-2688.json modified: 2019/2xxx/CVE-2019-2689.json modified: 2019/2xxx/CVE-2019-2690.json modified: 2019/2xxx/CVE-2019-2691.json modified: 2019/2xxx/CVE-2019-2692.json modified: 2019/2xxx/CVE-2019-2693.json modified: 2019/2xxx/CVE-2019-2694.json modified: 2019/2xxx/CVE-2019-2695.json modified: 2019/2xxx/CVE-2019-2696.json modified: 2019/2xxx/CVE-2019-2697.json modified: 2019/2xxx/CVE-2019-2698.json modified: 2019/2xxx/CVE-2019-2699.json modified: 2019/2xxx/CVE-2019-2700.json modified: 2019/2xxx/CVE-2019-2701.json modified: 2019/2xxx/CVE-2019-2702.json modified: 2019/2xxx/CVE-2019-2703.json modified: 2019/2xxx/CVE-2019-2704.json modified: 2019/2xxx/CVE-2019-2705.json modified: 2019/2xxx/CVE-2019-2706.json modified: 2019/2xxx/CVE-2019-2707.json modified: 2019/2xxx/CVE-2019-2708.json modified: 2019/2xxx/CVE-2019-2709.json modified: 2019/2xxx/CVE-2019-2712.json modified: 2019/2xxx/CVE-2019-2713.json modified: 2019/2xxx/CVE-2019-2719.json modified: 2019/2xxx/CVE-2019-2720.json modified: 2019/2xxx/CVE-2019-2721.json modified: 2019/2xxx/CVE-2019-2722.json modified: 2019/2xxx/CVE-2019-2723.json
2019-04-23 03:45:43 -07:00
},
{
2019-04-23 19:00:50 +00:00
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
2019-03-18 06:58:55 +00:00
}
]
}
}