cvelist/2019/2xxx/CVE-2019-2519.json

68 lines
3.5 KiB
JSON
Raw Normal View History

2019-01-16 14:04:51 -05:00
{
2019-03-18 05:40:22 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2019-2519",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PeopleSoft Enterprise SCM eProcurement",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.2"
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2019Jan Changes to be committed: modified: 2014/0xxx/CVE-2014-0114.json modified: 2015/0xxx/CVE-2015-0852.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2015/8xxx/CVE-2015-8965.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1xxx/CVE-2016-1181.json modified: 2016/1xxx/CVE-2016-1182.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/5xxx/CVE-2016-5684.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/9xxx/CVE-2016-9389.json modified: 2016/9xxx/CVE-2016-9392.json modified: 2016/9xxx/CVE-2016-9583.json modified: 2017/0xxx/CVE-2017-0379.json modified: 2017/13xxx/CVE-2017-13745.json modified: 2017/14xxx/CVE-2017-14229.json modified: 2017/14xxx/CVE-2017-14735.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9526.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/0xxx/CVE-2018-0733.json modified: 2018/0xxx/CVE-2018-0734.json modified: 2018/0xxx/CVE-2018-0735.json modified: 2018/0xxx/CVE-2018-0737.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/1000xxx/CVE-2018-1000120.json modified: 2018/1000xxx/CVE-2018-1000121.json modified: 2018/1000xxx/CVE-2018-1000122.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000300.json modified: 2018/1000xxx/CVE-2018-1000301.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000632.json modified: 2018/10xxx/CVE-2018-10933.json modified: 2018/11xxx/CVE-2018-11039.json modified: 2018/11xxx/CVE-2018-11040.json modified: 2018/11xxx/CVE-2018-11212.json modified: 2018/11xxx/CVE-2018-11763.json modified: 2018/11xxx/CVE-2018-11775.json modified: 2018/11xxx/CVE-2018-11776.json modified: 2018/11xxx/CVE-2018-11784.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/14xxx/CVE-2018-14719.json modified: 2018/14xxx/CVE-2018-14720.json modified: 2018/14xxx/CVE-2018-14721.json modified: 2018/1xxx/CVE-2018-1257.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1270.json modified: 2018/1xxx/CVE-2018-1271.json modified: 2018/1xxx/CVE-2018-1272.json modified: 2018/1xxx/CVE-2018-1275.json modified: 2018/1xxx/CVE-2018-1313.json modified: 2018/3xxx/CVE-2018-3125.json modified: 2018/3xxx/CVE-2018-3147.json modified: 2018/3xxx/CVE-2018-3246.json modified: 2018/3xxx/CVE-2018-3303.json modified: 2018/3xxx/CVE-2018-3304.json modified: 2018/3xxx/CVE-2018-3305.json modified: 2018/3xxx/CVE-2018-3309.json modified: 2018/3xxx/CVE-2018-3311.json modified: 2018/3xxx/CVE-2018-3639.json modified: 2018/3xxx/CVE-2018-3646.json modified: 2018/5xxx/CVE-2018-5390.json modified: 2018/5xxx/CVE-2018-5407.json modified: 2018/6xxx/CVE-2018-6922.json modified: 2018/7xxx/CVE-2018-7489.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/9xxx/CVE-2018-9206.json modified: 2019/2xxx/CVE-2019-2395.json modified: 2019/2xxx/CVE-2019-2396.json modified: 2019/2xxx/CVE-2019-2397.json modified: 2019/2xxx/CVE-2019-2398.json modified: 2019/2xxx/CVE-2019-2399.json modified: 2019/2xxx/CVE-2019-2400.json modified: 2019/2xxx/CVE-2019-2401.json modified: 2019/2xxx/CVE-2019-2402.json modified: 2019/2xxx/CVE-2019-2403.json modified: 2019/2xxx/CVE-2019-2404.json modified: 2019/2xxx/CVE-2019-2405.json modified: 2019/2xxx/CVE-2019-2406.json modified: 2019/2xxx/CVE-2019-2407.json modified: 2019/2xxx/CVE-2019-2408.json modified: 2019/2xxx/CVE-2019-2409.json modified: 2019/2xxx/CVE-2019-2410.json modified: 2019/2xxx/CVE-2019-2411.json modified: 2019/2xxx/CVE-2019-2412.json modified: 2019/2xxx/CVE-2019-2413.json modified: 2019/2xxx/CVE-2019-2414.json modified: 2019/2xxx/CVE-2019-2415.json modified: 2019/2xxx/CVE-2019-2416.json modified: 2019/2xxx/CVE-2019-2417.json modified: 2019/2xxx/CVE-2019-2418.json modified: 2019/2xxx/CVE-2019-2419.json modified: 2019/2xxx/CVE-2019-2420.json modified: 2019/2xxx/CVE-2019-2421.json modified: 2019/2xxx/CVE-2019-2422.json modified: 2019/2xxx/CVE-2019-2423.json modified: 2019/2xxx/CVE-2019-2425.json modified: 2019/2xxx/CVE-2019-2426.json modified: 2019/2xxx/CVE-2019-2427.json modified: 2019/2xxx/CVE-2019-2429.json modified: 2019/2xxx/CVE-2019-2430.json modified: 2019/2xxx/CVE-2019-2431.json modified: 2019/2xxx/CVE-2019-2432.json modified: 2019/2xxx/CVE-2019-2433.json modified: 2019/2xxx/CVE-2019-2434.json modified: 2019/2xxx/CVE-2019-2435.json modified: 2019/2xxx/CVE-2019-2436.json modified: 2019/2xxx/CVE-2019-2437.json modified: 2019/2xxx/CVE-2019-2438.json modified: 2019/2xxx/CVE-2019-2439.json modified: 2019/2xxx/CVE-2019-2440.json modified: 2019/2xxx/CVE-2019-2441.json modified: 2019/2xxx/CVE-2019-2442.json modified: 2019/2xxx/CVE-2019-2443.json modified: 2019/2xxx/CVE-2019-2444.json modified: 2019/2xxx/CVE-2019-2445.json modified: 2019/2xxx/CVE-2019-2446.json modified: 2019/2xxx/CVE-2019-2447.json modified: 2019/2xxx/CVE-2019-2448.json modified: 2019/2xxx/CVE-2019-2449.json modified: 2019/2xxx/CVE-2019-2450.json modified: 2019/2xxx/CVE-2019-2451.json modified: 2019/2xxx/CVE-2019-2452.json modified: 2019/2xxx/CVE-2019-2453.json modified: 2019/2xxx/CVE-2019-2455.json modified: 2019/2xxx/CVE-2019-2456.json modified: 2019/2xxx/CVE-2019-2457.json modified: 2019/2xxx/CVE-2019-2458.json modified: 2019/2xxx/CVE-2019-2459.json modified: 2019/2xxx/CVE-2019-2460.json modified: 2019/2xxx/CVE-2019-2461.json modified: 2019/2xxx/CVE-2019-2462.json modified: 2019/2xxx/CVE-2019-2463.json modified: 2019/2xxx/CVE-2019-2464.json modified: 2019/2xxx/CVE-2019-2465.json modified: 2019/2xxx/CVE-2019-2466.json modified: 2019/2xxx/CVE-2019-2467.json modified: 2019/2xxx/CVE-2019-2468.json modified: 2019/2xxx/CVE-2019-2469.json modified: 2019/2xxx/CVE-2019-2470.json modified: 2019/2xxx/CVE-2019-2471.json modified: 2019/2xxx/CVE-2019-2472.json modified: 2019/2xxx/CVE-2019-2473.json modified: 2019/2xxx/CVE-2019-2474.json modified: 2019/2xxx/CVE-2019-2475.json modified: 2019/2xxx/CVE-2019-2476.json modified: 2019/2xxx/CVE-2019-2477.json modified: 2019/2xxx/CVE-2019-2478.json modified: 2019/2xxx/CVE-2019-2479.json modified: 2019/2xxx/CVE-2019-2480.json modified: 2019/2xxx/CVE-2019-2481.json modified: 2019/2xxx/CVE-2019-2482.json modified: 2019/2xxx/CVE-2019-2485.json modified: 2019/2xxx/CVE-2019-2486.json modified: 2019/2xxx/CVE-2019-2487.json modified: 2019/2xxx/CVE-2019-2488.json modified: 2019/2xxx/CVE-2019-2489.json modified: 2019/2xxx/CVE-2019-2490.json modified: 2019/2xxx/CVE-2019-2491.json modified: 2019/2xxx/CVE-2019-2492.json modified: 2019/2xxx/CVE-2019-2493.json modified: 2019/2xxx/CVE-2019-2494.json modified: 2019/2xxx/CVE-2019-2495.json modified: 2019/2xxx/CVE-2019-2496.json modified: 2019/2xxx/CVE-2019-2497.json modified: 2019/2xxx/CVE-2019-2498.json modified: 2019/2xxx/CVE-2019-2499.json modified: 2019/2xxx/CVE-2019-2500.json modified: 2019/2xxx/CVE-2019-2501.json modified: 2019/2xxx/CVE-2019-2502.json modified: 2019/2xxx/CVE-2019-2503.json modified: 2019/2xxx/CVE-2019-2504.json modified: 2019/2xxx/CVE-2019-2505.json modified: 2019/2xxx/CVE-2019-2506.json modified: 2019/2xxx/CVE-2019-2507.json modified: 2019/2xxx/CVE-2019-2508.json modified: 2019/2xxx/CVE-2019-2509.json modified: 2019/2xxx/CVE-2019-2510.json modified: 2019/2xxx/CVE-2019-2511.json modified: 2019/2xxx/CVE-2019-2512.json modified: 2019/2xxx/CVE-2019-2513.json modified: 2019/2xxx/CVE-2019-2519.json modified: 2019/2xxx/CVE-2019-2520.json modified: 2019/2xxx/CVE-2019-2521.json modified: 2019/2xxx/CVE-2019-2522.json modified: 2019/2xxx/CVE-2019-2523.json modified: 2019/2xxx/CVE-2019-2524.json modified: 2019/2xxx/CVE-2019-2525.json modified: 2019/2xxx/CVE-2019-2526.json modified: 2019/2xxx/CVE-2019-2527.json modified: 2019/2xxx/CVE-2019-2528.json modified: 2019/2xxx/CVE-2019-2529.json modified: 2019/2xxx/CVE-2019-2530.json modified: 2019/2xxx/CVE-2019-2531.json modified: 2019/2xxx/CVE-2019-2532.json modified: 2019/2xxx/CVE-2019-2533.json modified: 2019/2xxx/CVE-2019-2534.json modified: 2019/2xxx/CVE-2019-2535.json modified: 2019/2xxx/CVE-2019-2536.json modified: 2019/2xxx/CVE-2019-2537.json modified: 2019/2xxx/CVE-2019-2538.json modified: 2019/2xxx/CVE-2019-2539.json modified: 2019/2xxx/CVE-2019-2540.json modified: 2019/2xxx/CVE-2019-2541.json modified: 2019/2xxx/CVE-2019-2543.json modified: 2019/2xxx/CVE-2019-2544.json modified: 2019/2xxx/CVE-2019-2545.json modified: 2019/2xxx/CVE-2019-2546.json modified: 2019/2xxx/CVE-2019-2547.json modified: 2019/2xxx/CVE-2019-2548.json modified: 2019/2xxx/CVE-2019-2549.json modified: 2019/2xxx/CVE-2019-2550.json modified: 2019/2xxx/CVE-2019-2552.json modified: 2019/2xxx/CVE-2019-2553.json modified: 2019/2xxx/CVE-2019-2554.json modified: 2019/2xxx/CVE-2019-2555.json modified: 2019/2xxx/CVE-2019-2556.json
2019-01-15 07:39:18 -08:00
{
2019-03-18 05:40:22 +00:00
"lang": "eng",
"value": "Vulnerability in the PeopleSoft Enterprise SCM eProcurement component of Oracle PeopleSoft Products (subcomponent: Manage Requisition Status). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM eProcurement. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise SCM eProcurement, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM eProcurement accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM eProcurement accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2019Jan Changes to be committed: modified: 2014/0xxx/CVE-2014-0114.json modified: 2015/0xxx/CVE-2015-0852.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2015/8xxx/CVE-2015-8965.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1xxx/CVE-2016-1181.json modified: 2016/1xxx/CVE-2016-1182.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/5xxx/CVE-2016-5684.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/9xxx/CVE-2016-9389.json modified: 2016/9xxx/CVE-2016-9392.json modified: 2016/9xxx/CVE-2016-9583.json modified: 2017/0xxx/CVE-2017-0379.json modified: 2017/13xxx/CVE-2017-13745.json modified: 2017/14xxx/CVE-2017-14229.json modified: 2017/14xxx/CVE-2017-14735.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9526.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/0xxx/CVE-2018-0733.json modified: 2018/0xxx/CVE-2018-0734.json modified: 2018/0xxx/CVE-2018-0735.json modified: 2018/0xxx/CVE-2018-0737.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/1000xxx/CVE-2018-1000120.json modified: 2018/1000xxx/CVE-2018-1000121.json modified: 2018/1000xxx/CVE-2018-1000122.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000300.json modified: 2018/1000xxx/CVE-2018-1000301.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000632.json modified: 2018/10xxx/CVE-2018-10933.json modified: 2018/11xxx/CVE-2018-11039.json modified: 2018/11xxx/CVE-2018-11040.json modified: 2018/11xxx/CVE-2018-11212.json modified: 2018/11xxx/CVE-2018-11763.json modified: 2018/11xxx/CVE-2018-11775.json modified: 2018/11xxx/CVE-2018-11776.json modified: 2018/11xxx/CVE-2018-11784.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/14xxx/CVE-2018-14719.json modified: 2018/14xxx/CVE-2018-14720.json modified: 2018/14xxx/CVE-2018-14721.json modified: 2018/1xxx/CVE-2018-1257.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1270.json modified: 2018/1xxx/CVE-2018-1271.json modified: 2018/1xxx/CVE-2018-1272.json modified: 2018/1xxx/CVE-2018-1275.json modified: 2018/1xxx/CVE-2018-1313.json modified: 2018/3xxx/CVE-2018-3125.json modified: 2018/3xxx/CVE-2018-3147.json modified: 2018/3xxx/CVE-2018-3246.json modified: 2018/3xxx/CVE-2018-3303.json modified: 2018/3xxx/CVE-2018-3304.json modified: 2018/3xxx/CVE-2018-3305.json modified: 2018/3xxx/CVE-2018-3309.json modified: 2018/3xxx/CVE-2018-3311.json modified: 2018/3xxx/CVE-2018-3639.json modified: 2018/3xxx/CVE-2018-3646.json modified: 2018/5xxx/CVE-2018-5390.json modified: 2018/5xxx/CVE-2018-5407.json modified: 2018/6xxx/CVE-2018-6922.json modified: 2018/7xxx/CVE-2018-7489.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/9xxx/CVE-2018-9206.json modified: 2019/2xxx/CVE-2019-2395.json modified: 2019/2xxx/CVE-2019-2396.json modified: 2019/2xxx/CVE-2019-2397.json modified: 2019/2xxx/CVE-2019-2398.json modified: 2019/2xxx/CVE-2019-2399.json modified: 2019/2xxx/CVE-2019-2400.json modified: 2019/2xxx/CVE-2019-2401.json modified: 2019/2xxx/CVE-2019-2402.json modified: 2019/2xxx/CVE-2019-2403.json modified: 2019/2xxx/CVE-2019-2404.json modified: 2019/2xxx/CVE-2019-2405.json modified: 2019/2xxx/CVE-2019-2406.json modified: 2019/2xxx/CVE-2019-2407.json modified: 2019/2xxx/CVE-2019-2408.json modified: 2019/2xxx/CVE-2019-2409.json modified: 2019/2xxx/CVE-2019-2410.json modified: 2019/2xxx/CVE-2019-2411.json modified: 2019/2xxx/CVE-2019-2412.json modified: 2019/2xxx/CVE-2019-2413.json modified: 2019/2xxx/CVE-2019-2414.json modified: 2019/2xxx/CVE-2019-2415.json modified: 2019/2xxx/CVE-2019-2416.json modified: 2019/2xxx/CVE-2019-2417.json modified: 2019/2xxx/CVE-2019-2418.json modified: 2019/2xxx/CVE-2019-2419.json modified: 2019/2xxx/CVE-2019-2420.json modified: 2019/2xxx/CVE-2019-2421.json modified: 2019/2xxx/CVE-2019-2422.json modified: 2019/2xxx/CVE-2019-2423.json modified: 2019/2xxx/CVE-2019-2425.json modified: 2019/2xxx/CVE-2019-2426.json modified: 2019/2xxx/CVE-2019-2427.json modified: 2019/2xxx/CVE-2019-2429.json modified: 2019/2xxx/CVE-2019-2430.json modified: 2019/2xxx/CVE-2019-2431.json modified: 2019/2xxx/CVE-2019-2432.json modified: 2019/2xxx/CVE-2019-2433.json modified: 2019/2xxx/CVE-2019-2434.json modified: 2019/2xxx/CVE-2019-2435.json modified: 2019/2xxx/CVE-2019-2436.json modified: 2019/2xxx/CVE-2019-2437.json modified: 2019/2xxx/CVE-2019-2438.json modified: 2019/2xxx/CVE-2019-2439.json modified: 2019/2xxx/CVE-2019-2440.json modified: 2019/2xxx/CVE-2019-2441.json modified: 2019/2xxx/CVE-2019-2442.json modified: 2019/2xxx/CVE-2019-2443.json modified: 2019/2xxx/CVE-2019-2444.json modified: 2019/2xxx/CVE-2019-2445.json modified: 2019/2xxx/CVE-2019-2446.json modified: 2019/2xxx/CVE-2019-2447.json modified: 2019/2xxx/CVE-2019-2448.json modified: 2019/2xxx/CVE-2019-2449.json modified: 2019/2xxx/CVE-2019-2450.json modified: 2019/2xxx/CVE-2019-2451.json modified: 2019/2xxx/CVE-2019-2452.json modified: 2019/2xxx/CVE-2019-2453.json modified: 2019/2xxx/CVE-2019-2455.json modified: 2019/2xxx/CVE-2019-2456.json modified: 2019/2xxx/CVE-2019-2457.json modified: 2019/2xxx/CVE-2019-2458.json modified: 2019/2xxx/CVE-2019-2459.json modified: 2019/2xxx/CVE-2019-2460.json modified: 2019/2xxx/CVE-2019-2461.json modified: 2019/2xxx/CVE-2019-2462.json modified: 2019/2xxx/CVE-2019-2463.json modified: 2019/2xxx/CVE-2019-2464.json modified: 2019/2xxx/CVE-2019-2465.json modified: 2019/2xxx/CVE-2019-2466.json modified: 2019/2xxx/CVE-2019-2467.json modified: 2019/2xxx/CVE-2019-2468.json modified: 2019/2xxx/CVE-2019-2469.json modified: 2019/2xxx/CVE-2019-2470.json modified: 2019/2xxx/CVE-2019-2471.json modified: 2019/2xxx/CVE-2019-2472.json modified: 2019/2xxx/CVE-2019-2473.json modified: 2019/2xxx/CVE-2019-2474.json modified: 2019/2xxx/CVE-2019-2475.json modified: 2019/2xxx/CVE-2019-2476.json modified: 2019/2xxx/CVE-2019-2477.json modified: 2019/2xxx/CVE-2019-2478.json modified: 2019/2xxx/CVE-2019-2479.json modified: 2019/2xxx/CVE-2019-2480.json modified: 2019/2xxx/CVE-2019-2481.json modified: 2019/2xxx/CVE-2019-2482.json modified: 2019/2xxx/CVE-2019-2485.json modified: 2019/2xxx/CVE-2019-2486.json modified: 2019/2xxx/CVE-2019-2487.json modified: 2019/2xxx/CVE-2019-2488.json modified: 2019/2xxx/CVE-2019-2489.json modified: 2019/2xxx/CVE-2019-2490.json modified: 2019/2xxx/CVE-2019-2491.json modified: 2019/2xxx/CVE-2019-2492.json modified: 2019/2xxx/CVE-2019-2493.json modified: 2019/2xxx/CVE-2019-2494.json modified: 2019/2xxx/CVE-2019-2495.json modified: 2019/2xxx/CVE-2019-2496.json modified: 2019/2xxx/CVE-2019-2497.json modified: 2019/2xxx/CVE-2019-2498.json modified: 2019/2xxx/CVE-2019-2499.json modified: 2019/2xxx/CVE-2019-2500.json modified: 2019/2xxx/CVE-2019-2501.json modified: 2019/2xxx/CVE-2019-2502.json modified: 2019/2xxx/CVE-2019-2503.json modified: 2019/2xxx/CVE-2019-2504.json modified: 2019/2xxx/CVE-2019-2505.json modified: 2019/2xxx/CVE-2019-2506.json modified: 2019/2xxx/CVE-2019-2507.json modified: 2019/2xxx/CVE-2019-2508.json modified: 2019/2xxx/CVE-2019-2509.json modified: 2019/2xxx/CVE-2019-2510.json modified: 2019/2xxx/CVE-2019-2511.json modified: 2019/2xxx/CVE-2019-2512.json modified: 2019/2xxx/CVE-2019-2513.json modified: 2019/2xxx/CVE-2019-2519.json modified: 2019/2xxx/CVE-2019-2520.json modified: 2019/2xxx/CVE-2019-2521.json modified: 2019/2xxx/CVE-2019-2522.json modified: 2019/2xxx/CVE-2019-2523.json modified: 2019/2xxx/CVE-2019-2524.json modified: 2019/2xxx/CVE-2019-2525.json modified: 2019/2xxx/CVE-2019-2526.json modified: 2019/2xxx/CVE-2019-2527.json modified: 2019/2xxx/CVE-2019-2528.json modified: 2019/2xxx/CVE-2019-2529.json modified: 2019/2xxx/CVE-2019-2530.json modified: 2019/2xxx/CVE-2019-2531.json modified: 2019/2xxx/CVE-2019-2532.json modified: 2019/2xxx/CVE-2019-2533.json modified: 2019/2xxx/CVE-2019-2534.json modified: 2019/2xxx/CVE-2019-2535.json modified: 2019/2xxx/CVE-2019-2536.json modified: 2019/2xxx/CVE-2019-2537.json modified: 2019/2xxx/CVE-2019-2538.json modified: 2019/2xxx/CVE-2019-2539.json modified: 2019/2xxx/CVE-2019-2540.json modified: 2019/2xxx/CVE-2019-2541.json modified: 2019/2xxx/CVE-2019-2543.json modified: 2019/2xxx/CVE-2019-2544.json modified: 2019/2xxx/CVE-2019-2545.json modified: 2019/2xxx/CVE-2019-2546.json modified: 2019/2xxx/CVE-2019-2547.json modified: 2019/2xxx/CVE-2019-2548.json modified: 2019/2xxx/CVE-2019-2549.json modified: 2019/2xxx/CVE-2019-2550.json modified: 2019/2xxx/CVE-2019-2552.json modified: 2019/2xxx/CVE-2019-2553.json modified: 2019/2xxx/CVE-2019-2554.json modified: 2019/2xxx/CVE-2019-2555.json modified: 2019/2xxx/CVE-2019-2556.json
2019-01-15 07:39:18 -08:00
}
2019-03-18 05:40:22 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM eProcurement. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise SCM eProcurement, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM eProcurement accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM eProcurement accessible data."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "106604",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106604"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
}
]
}
}