cvelist/2018/2xxx/CVE-2018-2772.json

69 lines
2.4 KiB
JSON
Raw Normal View History

Committer: Bill Situ <Bill.Situ@Oracle.com> On branch cna/oracle/OracleCPUApr2018 Changes to be committed: modified: 2013/1xxx/CVE-2013-1768.json modified: 2014/0xxx/CVE-2014-0054.json modified: 2015/7xxx/CVE-2015-7501.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/2xxx/CVE-2016-2177.json modified: 2016/2xxx/CVE-2016-2178.json modified: 2016/2xxx/CVE-2016-2179.json modified: 2016/2xxx/CVE-2016-2180.json modified: 2016/2xxx/CVE-2016-2181.json modified: 2016/2xxx/CVE-2016-2182.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/3xxx/CVE-2016-3092.json modified: 2016/3xxx/CVE-2016-3506.json modified: 2016/5xxx/CVE-2016-5007.json modified: 2016/5xxx/CVE-2016-5019.json modified: 2016/6xxx/CVE-2016-6302.json modified: 2016/6xxx/CVE-2016-6303.json modified: 2016/6xxx/CVE-2016-6304.json modified: 2016/6xxx/CVE-2016-6305.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6307.json modified: 2016/6xxx/CVE-2016-6308.json modified: 2016/6xxx/CVE-2016-6309.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/7xxx/CVE-2016-7052.json modified: 2016/8xxx/CVE-2016-8745.json modified: 2016/9xxx/CVE-2016-9878.json modified: 2017/12xxx/CVE-2017-12617.json modified: 2017/13xxx/CVE-2017-13077.json modified: 2017/13xxx/CVE-2017-13078.json modified: 2017/13xxx/CVE-2017-13080.json modified: 2017/13xxx/CVE-2017-13082.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/15xxx/CVE-2017-15707.json modified: 2017/17xxx/CVE-2017-17562.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3737.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5662.json modified: 2017/5xxx/CVE-2017-5664.json modified: 2017/5xxx/CVE-2017-5753.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7674.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/2xxx/CVE-2018-2563.json modified: 2018/2xxx/CVE-2018-2572.json modified: 2018/2xxx/CVE-2018-2587.json modified: 2018/2xxx/CVE-2018-2628.json modified: 2018/2xxx/CVE-2018-2718.json modified: 2018/2xxx/CVE-2018-2737.json modified: 2018/2xxx/CVE-2018-2738.json modified: 2018/2xxx/CVE-2018-2739.json modified: 2018/2xxx/CVE-2018-2742.json modified: 2018/2xxx/CVE-2018-2746.json modified: 2018/2xxx/CVE-2018-2747.json modified: 2018/2xxx/CVE-2018-2748.json modified: 2018/2xxx/CVE-2018-2749.json modified: 2018/2xxx/CVE-2018-2750.json modified: 2018/2xxx/CVE-2018-2752.json modified: 2018/2xxx/CVE-2018-2753.json modified: 2018/2xxx/CVE-2018-2754.json modified: 2018/2xxx/CVE-2018-2755.json modified: 2018/2xxx/CVE-2018-2756.json modified: 2018/2xxx/CVE-2018-2758.json modified: 2018/2xxx/CVE-2018-2759.json modified: 2018/2xxx/CVE-2018-2760.json modified: 2018/2xxx/CVE-2018-2761.json modified: 2018/2xxx/CVE-2018-2762.json modified: 2018/2xxx/CVE-2018-2763.json modified: 2018/2xxx/CVE-2018-2764.json modified: 2018/2xxx/CVE-2018-2765.json modified: 2018/2xxx/CVE-2018-2766.json modified: 2018/2xxx/CVE-2018-2768.json modified: 2018/2xxx/CVE-2018-2769.json modified: 2018/2xxx/CVE-2018-2770.json modified: 2018/2xxx/CVE-2018-2771.json modified: 2018/2xxx/CVE-2018-2772.json modified: 2018/2xxx/CVE-2018-2773.json modified: 2018/2xxx/CVE-2018-2774.json modified: 2018/2xxx/CVE-2018-2775.json modified: 2018/2xxx/CVE-2018-2776.json modified: 2018/2xxx/CVE-2018-2777.json modified: 2018/2xxx/CVE-2018-2778.json modified: 2018/2xxx/CVE-2018-2779.json modified: 2018/2xxx/CVE-2018-2780.json modified: 2018/2xxx/CVE-2018-2781.json modified: 2018/2xxx/CVE-2018-2782.json modified: 2018/2xxx/CVE-2018-2783.json modified: 2018/2xxx/CVE-2018-2784.json modified: 2018/2xxx/CVE-2018-2785.json modified: 2018/2xxx/CVE-2018-2786.json modified: 2018/2xxx/CVE-2018-2787.json modified: 2018/2xxx/CVE-2018-2788.json modified: 2018/2xxx/CVE-2018-2789.json modified: 2018/2xxx/CVE-2018-2790.json modified: 2018/2xxx/CVE-2018-2791.json modified: 2018/2xxx/CVE-2018-2792.json modified: 2018/2xxx/CVE-2018-2793.json modified: 2018/2xxx/CVE-2018-2794.json modified: 2018/2xxx/CVE-2018-2795.json modified: 2018/2xxx/CVE-2018-2796.json modified: 2018/2xxx/CVE-2018-2797.json modified: 2018/2xxx/CVE-2018-2798.json modified: 2018/2xxx/CVE-2018-2799.json modified: 2018/2xxx/CVE-2018-2800.json modified: 2018/2xxx/CVE-2018-2801.json modified: 2018/2xxx/CVE-2018-2802.json modified: 2018/2xxx/CVE-2018-2803.json modified: 2018/2xxx/CVE-2018-2804.json modified: 2018/2xxx/CVE-2018-2805.json modified: 2018/2xxx/CVE-2018-2806.json modified: 2018/2xxx/CVE-2018-2807.json modified: 2018/2xxx/CVE-2018-2808.json modified: 2018/2xxx/CVE-2018-2809.json modified: 2018/2xxx/CVE-2018-2810.json modified: 2018/2xxx/CVE-2018-2811.json modified: 2018/2xxx/CVE-2018-2812.json modified: 2018/2xxx/CVE-2018-2813.json modified: 2018/2xxx/CVE-2018-2814.json modified: 2018/2xxx/CVE-2018-2815.json modified: 2018/2xxx/CVE-2018-2816.json modified: 2018/2xxx/CVE-2018-2817.json modified: 2018/2xxx/CVE-2018-2818.json modified: 2018/2xxx/CVE-2018-2819.json modified: 2018/2xxx/CVE-2018-2820.json modified: 2018/2xxx/CVE-2018-2821.json modified: 2018/2xxx/CVE-2018-2822.json modified: 2018/2xxx/CVE-2018-2823.json modified: 2018/2xxx/CVE-2018-2824.json modified: 2018/2xxx/CVE-2018-2825.json modified: 2018/2xxx/CVE-2018-2826.json modified: 2018/2xxx/CVE-2018-2827.json modified: 2018/2xxx/CVE-2018-2828.json modified: 2018/2xxx/CVE-2018-2829.json modified: 2018/2xxx/CVE-2018-2830.json modified: 2018/2xxx/CVE-2018-2831.json modified: 2018/2xxx/CVE-2018-2832.json modified: 2018/2xxx/CVE-2018-2833.json modified: 2018/2xxx/CVE-2018-2834.json modified: 2018/2xxx/CVE-2018-2835.json modified: 2018/2xxx/CVE-2018-2836.json modified: 2018/2xxx/CVE-2018-2837.json modified: 2018/2xxx/CVE-2018-2838.json modified: 2018/2xxx/CVE-2018-2839.json modified: 2018/2xxx/CVE-2018-2840.json modified: 2018/2xxx/CVE-2018-2841.json modified: 2018/2xxx/CVE-2018-2842.json modified: 2018/2xxx/CVE-2018-2843.json modified: 2018/2xxx/CVE-2018-2844.json modified: 2018/2xxx/CVE-2018-2845.json modified: 2018/2xxx/CVE-2018-2846.json modified: 2018/2xxx/CVE-2018-2847.json modified: 2018/2xxx/CVE-2018-2848.json modified: 2018/2xxx/CVE-2018-2849.json modified: 2018/2xxx/CVE-2018-2850.json modified: 2018/2xxx/CVE-2018-2851.json modified: 2018/2xxx/CVE-2018-2852.json modified: 2018/2xxx/CVE-2018-2853.json modified: 2018/2xxx/CVE-2018-2854.json modified: 2018/2xxx/CVE-2018-2855.json modified: 2018/2xxx/CVE-2018-2856.json modified: 2018/2xxx/CVE-2018-2857.json modified: 2018/2xxx/CVE-2018-2858.json modified: 2018/2xxx/CVE-2018-2859.json modified: 2018/2xxx/CVE-2018-2860.json modified: 2018/2xxx/CVE-2018-2861.json modified: 2018/2xxx/CVE-2018-2862.json modified: 2018/2xxx/CVE-2018-2863.json modified: 2018/2xxx/CVE-2018-2864.json modified: 2018/2xxx/CVE-2018-2865.json modified: 2018/2xxx/CVE-2018-2866.json modified: 2018/2xxx/CVE-2018-2867.json modified: 2018/2xxx/CVE-2018-2868.json modified: 2018/2xxx/CVE-2018-2869.json modified: 2018/2xxx/CVE-2018-2870.json modified: 2018/2xxx/CVE-2018-2871.json modified: 2018/2xxx/CVE-2018-2872.json modified: 2018/2xxx/CVE-2018-2873.json modified: 2018/2xxx/CVE-2018-2874.json modified: 2018/2xxx/CVE-2018-2876.json modified: 2018/2xxx/CVE-2018-2877.json modified: 2018/2xxx/CVE-2018-2878.json modified: 2018/2xxx/CVE-2018-2879.json modified: 2018/7xxx/CVE-2018-7489.json
2018-04-17 15:58:30 -07:00
{
"data_type":"CVE",
"data_format":"MITRE",
"data_version":"4.0",
"CVE_data_meta": {
"ID":"CVE-2018-2772",
"ASSIGNER":"secalert_us@oracle.com"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name":"Oracle Corporation",
"product": {
"product_data": [
{
"product_name":"PeopleSoft Enterprise PT PeopleTools",
"version": {
"version_data": [
{
"version_value":"8.54",
"version_affected":"="
},
{
"version_value":"8.55",
"version_affected":"="
},
{
"version_value":"8.56",
"version_affected":"="
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang":"eng",
"value":"Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PeopleTools."
}
]
}
2017-12-15 15:04:16 -05:00
]
Committer: Bill Situ <Bill.Situ@Oracle.com> On branch cna/oracle/OracleCPUApr2018 Changes to be committed: modified: 2013/1xxx/CVE-2013-1768.json modified: 2014/0xxx/CVE-2014-0054.json modified: 2015/7xxx/CVE-2015-7501.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/2xxx/CVE-2016-2177.json modified: 2016/2xxx/CVE-2016-2178.json modified: 2016/2xxx/CVE-2016-2179.json modified: 2016/2xxx/CVE-2016-2180.json modified: 2016/2xxx/CVE-2016-2181.json modified: 2016/2xxx/CVE-2016-2182.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/3xxx/CVE-2016-3092.json modified: 2016/3xxx/CVE-2016-3506.json modified: 2016/5xxx/CVE-2016-5007.json modified: 2016/5xxx/CVE-2016-5019.json modified: 2016/6xxx/CVE-2016-6302.json modified: 2016/6xxx/CVE-2016-6303.json modified: 2016/6xxx/CVE-2016-6304.json modified: 2016/6xxx/CVE-2016-6305.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6307.json modified: 2016/6xxx/CVE-2016-6308.json modified: 2016/6xxx/CVE-2016-6309.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/7xxx/CVE-2016-7052.json modified: 2016/8xxx/CVE-2016-8745.json modified: 2016/9xxx/CVE-2016-9878.json modified: 2017/12xxx/CVE-2017-12617.json modified: 2017/13xxx/CVE-2017-13077.json modified: 2017/13xxx/CVE-2017-13078.json modified: 2017/13xxx/CVE-2017-13080.json modified: 2017/13xxx/CVE-2017-13082.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/15xxx/CVE-2017-15707.json modified: 2017/17xxx/CVE-2017-17562.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3737.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5662.json modified: 2017/5xxx/CVE-2017-5664.json modified: 2017/5xxx/CVE-2017-5753.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7674.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/2xxx/CVE-2018-2563.json modified: 2018/2xxx/CVE-2018-2572.json modified: 2018/2xxx/CVE-2018-2587.json modified: 2018/2xxx/CVE-2018-2628.json modified: 2018/2xxx/CVE-2018-2718.json modified: 2018/2xxx/CVE-2018-2737.json modified: 2018/2xxx/CVE-2018-2738.json modified: 2018/2xxx/CVE-2018-2739.json modified: 2018/2xxx/CVE-2018-2742.json modified: 2018/2xxx/CVE-2018-2746.json modified: 2018/2xxx/CVE-2018-2747.json modified: 2018/2xxx/CVE-2018-2748.json modified: 2018/2xxx/CVE-2018-2749.json modified: 2018/2xxx/CVE-2018-2750.json modified: 2018/2xxx/CVE-2018-2752.json modified: 2018/2xxx/CVE-2018-2753.json modified: 2018/2xxx/CVE-2018-2754.json modified: 2018/2xxx/CVE-2018-2755.json modified: 2018/2xxx/CVE-2018-2756.json modified: 2018/2xxx/CVE-2018-2758.json modified: 2018/2xxx/CVE-2018-2759.json modified: 2018/2xxx/CVE-2018-2760.json modified: 2018/2xxx/CVE-2018-2761.json modified: 2018/2xxx/CVE-2018-2762.json modified: 2018/2xxx/CVE-2018-2763.json modified: 2018/2xxx/CVE-2018-2764.json modified: 2018/2xxx/CVE-2018-2765.json modified: 2018/2xxx/CVE-2018-2766.json modified: 2018/2xxx/CVE-2018-2768.json modified: 2018/2xxx/CVE-2018-2769.json modified: 2018/2xxx/CVE-2018-2770.json modified: 2018/2xxx/CVE-2018-2771.json modified: 2018/2xxx/CVE-2018-2772.json modified: 2018/2xxx/CVE-2018-2773.json modified: 2018/2xxx/CVE-2018-2774.json modified: 2018/2xxx/CVE-2018-2775.json modified: 2018/2xxx/CVE-2018-2776.json modified: 2018/2xxx/CVE-2018-2777.json modified: 2018/2xxx/CVE-2018-2778.json modified: 2018/2xxx/CVE-2018-2779.json modified: 2018/2xxx/CVE-2018-2780.json modified: 2018/2xxx/CVE-2018-2781.json modified: 2018/2xxx/CVE-2018-2782.json modified: 2018/2xxx/CVE-2018-2783.json modified: 2018/2xxx/CVE-2018-2784.json modified: 2018/2xxx/CVE-2018-2785.json modified: 2018/2xxx/CVE-2018-2786.json modified: 2018/2xxx/CVE-2018-2787.json modified: 2018/2xxx/CVE-2018-2788.json modified: 2018/2xxx/CVE-2018-2789.json modified: 2018/2xxx/CVE-2018-2790.json modified: 2018/2xxx/CVE-2018-2791.json modified: 2018/2xxx/CVE-2018-2792.json modified: 2018/2xxx/CVE-2018-2793.json modified: 2018/2xxx/CVE-2018-2794.json modified: 2018/2xxx/CVE-2018-2795.json modified: 2018/2xxx/CVE-2018-2796.json modified: 2018/2xxx/CVE-2018-2797.json modified: 2018/2xxx/CVE-2018-2798.json modified: 2018/2xxx/CVE-2018-2799.json modified: 2018/2xxx/CVE-2018-2800.json modified: 2018/2xxx/CVE-2018-2801.json modified: 2018/2xxx/CVE-2018-2802.json modified: 2018/2xxx/CVE-2018-2803.json modified: 2018/2xxx/CVE-2018-2804.json modified: 2018/2xxx/CVE-2018-2805.json modified: 2018/2xxx/CVE-2018-2806.json modified: 2018/2xxx/CVE-2018-2807.json modified: 2018/2xxx/CVE-2018-2808.json modified: 2018/2xxx/CVE-2018-2809.json modified: 2018/2xxx/CVE-2018-2810.json modified: 2018/2xxx/CVE-2018-2811.json modified: 2018/2xxx/CVE-2018-2812.json modified: 2018/2xxx/CVE-2018-2813.json modified: 2018/2xxx/CVE-2018-2814.json modified: 2018/2xxx/CVE-2018-2815.json modified: 2018/2xxx/CVE-2018-2816.json modified: 2018/2xxx/CVE-2018-2817.json modified: 2018/2xxx/CVE-2018-2818.json modified: 2018/2xxx/CVE-2018-2819.json modified: 2018/2xxx/CVE-2018-2820.json modified: 2018/2xxx/CVE-2018-2821.json modified: 2018/2xxx/CVE-2018-2822.json modified: 2018/2xxx/CVE-2018-2823.json modified: 2018/2xxx/CVE-2018-2824.json modified: 2018/2xxx/CVE-2018-2825.json modified: 2018/2xxx/CVE-2018-2826.json modified: 2018/2xxx/CVE-2018-2827.json modified: 2018/2xxx/CVE-2018-2828.json modified: 2018/2xxx/CVE-2018-2829.json modified: 2018/2xxx/CVE-2018-2830.json modified: 2018/2xxx/CVE-2018-2831.json modified: 2018/2xxx/CVE-2018-2832.json modified: 2018/2xxx/CVE-2018-2833.json modified: 2018/2xxx/CVE-2018-2834.json modified: 2018/2xxx/CVE-2018-2835.json modified: 2018/2xxx/CVE-2018-2836.json modified: 2018/2xxx/CVE-2018-2837.json modified: 2018/2xxx/CVE-2018-2838.json modified: 2018/2xxx/CVE-2018-2839.json modified: 2018/2xxx/CVE-2018-2840.json modified: 2018/2xxx/CVE-2018-2841.json modified: 2018/2xxx/CVE-2018-2842.json modified: 2018/2xxx/CVE-2018-2843.json modified: 2018/2xxx/CVE-2018-2844.json modified: 2018/2xxx/CVE-2018-2845.json modified: 2018/2xxx/CVE-2018-2846.json modified: 2018/2xxx/CVE-2018-2847.json modified: 2018/2xxx/CVE-2018-2848.json modified: 2018/2xxx/CVE-2018-2849.json modified: 2018/2xxx/CVE-2018-2850.json modified: 2018/2xxx/CVE-2018-2851.json modified: 2018/2xxx/CVE-2018-2852.json modified: 2018/2xxx/CVE-2018-2853.json modified: 2018/2xxx/CVE-2018-2854.json modified: 2018/2xxx/CVE-2018-2855.json modified: 2018/2xxx/CVE-2018-2856.json modified: 2018/2xxx/CVE-2018-2857.json modified: 2018/2xxx/CVE-2018-2858.json modified: 2018/2xxx/CVE-2018-2859.json modified: 2018/2xxx/CVE-2018-2860.json modified: 2018/2xxx/CVE-2018-2861.json modified: 2018/2xxx/CVE-2018-2862.json modified: 2018/2xxx/CVE-2018-2863.json modified: 2018/2xxx/CVE-2018-2864.json modified: 2018/2xxx/CVE-2018-2865.json modified: 2018/2xxx/CVE-2018-2866.json modified: 2018/2xxx/CVE-2018-2867.json modified: 2018/2xxx/CVE-2018-2868.json modified: 2018/2xxx/CVE-2018-2869.json modified: 2018/2xxx/CVE-2018-2870.json modified: 2018/2xxx/CVE-2018-2871.json modified: 2018/2xxx/CVE-2018-2872.json modified: 2018/2xxx/CVE-2018-2873.json modified: 2018/2xxx/CVE-2018-2874.json modified: 2018/2xxx/CVE-2018-2876.json modified: 2018/2xxx/CVE-2018-2877.json modified: 2018/2xxx/CVE-2018-2878.json modified: 2018/2xxx/CVE-2018-2879.json modified: 2018/7xxx/CVE-2018-7489.json
2018-04-17 15:58:30 -07:00
},
"references": {
"reference_data": [
{
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
}
]
},
"description": {
"description_data": [
{
"lang":"eng",
"value":"Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Rich Text Editor). Supported versions that are affected are 8.54, 8.55 and 8.56. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."
}
]
}
}