cvelist/2020/2xxx/CVE-2020-2649.json
Bill Situ ec2f96b090 Bill Situ <Bill.Situ@Oracle.com>
Add impact field to CVE in Oracle 2020 January Critical Patch Updates

 On branch cna/Oracle/CPU2020JanCVSS
 Changes to be committed:
	modified:   2012/1xxx/CVE-2012-1695.json
	modified:   2019/2xxx/CVE-2019-2725.json
	modified:   2019/2xxx/CVE-2019-2729.json
	modified:   2019/2xxx/CVE-2019-2904.json
	modified:   2020/2xxx/CVE-2020-2510.json
	modified:   2020/2xxx/CVE-2020-2511.json
	modified:   2020/2xxx/CVE-2020-2512.json
	modified:   2020/2xxx/CVE-2020-2515.json
	modified:   2020/2xxx/CVE-2020-2516.json
	modified:   2020/2xxx/CVE-2020-2517.json
	modified:   2020/2xxx/CVE-2020-2518.json
	modified:   2020/2xxx/CVE-2020-2519.json
	modified:   2020/2xxx/CVE-2020-2527.json
	modified:   2020/2xxx/CVE-2020-2530.json
	modified:   2020/2xxx/CVE-2020-2531.json
	modified:   2020/2xxx/CVE-2020-2533.json
	modified:   2020/2xxx/CVE-2020-2534.json
	modified:   2020/2xxx/CVE-2020-2535.json
	modified:   2020/2xxx/CVE-2020-2536.json
	modified:   2020/2xxx/CVE-2020-2537.json
	modified:   2020/2xxx/CVE-2020-2538.json
	modified:   2020/2xxx/CVE-2020-2539.json
	modified:   2020/2xxx/CVE-2020-2540.json
	modified:   2020/2xxx/CVE-2020-2541.json
	modified:   2020/2xxx/CVE-2020-2542.json
	modified:   2020/2xxx/CVE-2020-2543.json
	modified:   2020/2xxx/CVE-2020-2544.json
	modified:   2020/2xxx/CVE-2020-2545.json
	modified:   2020/2xxx/CVE-2020-2546.json
	modified:   2020/2xxx/CVE-2020-2547.json
	modified:   2020/2xxx/CVE-2020-2548.json
	modified:   2020/2xxx/CVE-2020-2549.json
	modified:   2020/2xxx/CVE-2020-2550.json
	modified:   2020/2xxx/CVE-2020-2551.json
	modified:   2020/2xxx/CVE-2020-2552.json
	modified:   2020/2xxx/CVE-2020-2555.json
	modified:   2020/2xxx/CVE-2020-2556.json
	modified:   2020/2xxx/CVE-2020-2557.json
	modified:   2020/2xxx/CVE-2020-2558.json
	modified:   2020/2xxx/CVE-2020-2559.json
	modified:   2020/2xxx/CVE-2020-2560.json
	modified:   2020/2xxx/CVE-2020-2561.json
	modified:   2020/2xxx/CVE-2020-2563.json
	modified:   2020/2xxx/CVE-2020-2564.json
	modified:   2020/2xxx/CVE-2020-2565.json
	modified:   2020/2xxx/CVE-2020-2566.json
	modified:   2020/2xxx/CVE-2020-2567.json
	modified:   2020/2xxx/CVE-2020-2568.json
	modified:   2020/2xxx/CVE-2020-2569.json
	modified:   2020/2xxx/CVE-2020-2570.json
	modified:   2020/2xxx/CVE-2020-2571.json
	modified:   2020/2xxx/CVE-2020-2572.json
	modified:   2020/2xxx/CVE-2020-2573.json
	modified:   2020/2xxx/CVE-2020-2574.json
	modified:   2020/2xxx/CVE-2020-2576.json
	modified:   2020/2xxx/CVE-2020-2577.json
	modified:   2020/2xxx/CVE-2020-2578.json
	modified:   2020/2xxx/CVE-2020-2579.json
	modified:   2020/2xxx/CVE-2020-2580.json
	modified:   2020/2xxx/CVE-2020-2581.json
	modified:   2020/2xxx/CVE-2020-2582.json
	modified:   2020/2xxx/CVE-2020-2583.json
	modified:   2020/2xxx/CVE-2020-2584.json
	modified:   2020/2xxx/CVE-2020-2585.json
	modified:   2020/2xxx/CVE-2020-2586.json
	modified:   2020/2xxx/CVE-2020-2587.json
	modified:   2020/2xxx/CVE-2020-2588.json
	modified:   2020/2xxx/CVE-2020-2589.json
	modified:   2020/2xxx/CVE-2020-2590.json
	modified:   2020/2xxx/CVE-2020-2591.json
	modified:   2020/2xxx/CVE-2020-2592.json
	modified:   2020/2xxx/CVE-2020-2593.json
	modified:   2020/2xxx/CVE-2020-2595.json
	modified:   2020/2xxx/CVE-2020-2596.json
	modified:   2020/2xxx/CVE-2020-2597.json
	modified:   2020/2xxx/CVE-2020-2598.json
	modified:   2020/2xxx/CVE-2020-2599.json
	modified:   2020/2xxx/CVE-2020-2600.json
	modified:   2020/2xxx/CVE-2020-2601.json
	modified:   2020/2xxx/CVE-2020-2602.json
	modified:   2020/2xxx/CVE-2020-2603.json
	modified:   2020/2xxx/CVE-2020-2604.json
	modified:   2020/2xxx/CVE-2020-2605.json
	modified:   2020/2xxx/CVE-2020-2606.json
	modified:   2020/2xxx/CVE-2020-2607.json
	modified:   2020/2xxx/CVE-2020-2608.json
	modified:   2020/2xxx/CVE-2020-2609.json
	modified:   2020/2xxx/CVE-2020-2610.json
	modified:   2020/2xxx/CVE-2020-2611.json
	modified:   2020/2xxx/CVE-2020-2612.json
	modified:   2020/2xxx/CVE-2020-2613.json
	modified:   2020/2xxx/CVE-2020-2614.json
	modified:   2020/2xxx/CVE-2020-2615.json
	modified:   2020/2xxx/CVE-2020-2616.json
	modified:   2020/2xxx/CVE-2020-2617.json
	modified:   2020/2xxx/CVE-2020-2618.json
	modified:   2020/2xxx/CVE-2020-2619.json
	modified:   2020/2xxx/CVE-2020-2620.json
	modified:   2020/2xxx/CVE-2020-2621.json
	modified:   2020/2xxx/CVE-2020-2622.json
	modified:   2020/2xxx/CVE-2020-2623.json
	modified:   2020/2xxx/CVE-2020-2624.json
	modified:   2020/2xxx/CVE-2020-2625.json
	modified:   2020/2xxx/CVE-2020-2626.json
	modified:   2020/2xxx/CVE-2020-2627.json
	modified:   2020/2xxx/CVE-2020-2628.json
	modified:   2020/2xxx/CVE-2020-2629.json
	modified:   2020/2xxx/CVE-2020-2630.json
	modified:   2020/2xxx/CVE-2020-2631.json
	modified:   2020/2xxx/CVE-2020-2632.json
	modified:   2020/2xxx/CVE-2020-2633.json
	modified:   2020/2xxx/CVE-2020-2634.json
	modified:   2020/2xxx/CVE-2020-2635.json
	modified:   2020/2xxx/CVE-2020-2636.json
	modified:   2020/2xxx/CVE-2020-2637.json
	modified:   2020/2xxx/CVE-2020-2638.json
	modified:   2020/2xxx/CVE-2020-2639.json
	modified:   2020/2xxx/CVE-2020-2640.json
	modified:   2020/2xxx/CVE-2020-2641.json
	modified:   2020/2xxx/CVE-2020-2642.json
	modified:   2020/2xxx/CVE-2020-2643.json
	modified:   2020/2xxx/CVE-2020-2644.json
	modified:   2020/2xxx/CVE-2020-2645.json
	modified:   2020/2xxx/CVE-2020-2646.json
	modified:   2020/2xxx/CVE-2020-2647.json
	modified:   2020/2xxx/CVE-2020-2648.json
	modified:   2020/2xxx/CVE-2020-2649.json
	modified:   2020/2xxx/CVE-2020-2650.json
	modified:   2020/2xxx/CVE-2020-2651.json
	modified:   2020/2xxx/CVE-2020-2652.json
	modified:   2020/2xxx/CVE-2020-2653.json
	modified:   2020/2xxx/CVE-2020-2654.json
	modified:   2020/2xxx/CVE-2020-2655.json
	modified:   2020/2xxx/CVE-2020-2656.json
	modified:   2020/2xxx/CVE-2020-2657.json
	modified:   2020/2xxx/CVE-2020-2658.json
	modified:   2020/2xxx/CVE-2020-2659.json
	modified:   2020/2xxx/CVE-2020-2660.json
	modified:   2020/2xxx/CVE-2020-2661.json
	modified:   2020/2xxx/CVE-2020-2662.json
	modified:   2020/2xxx/CVE-2020-2663.json
	modified:   2020/2xxx/CVE-2020-2664.json
	modified:   2020/2xxx/CVE-2020-2665.json
	modified:   2020/2xxx/CVE-2020-2666.json
	modified:   2020/2xxx/CVE-2020-2667.json
	modified:   2020/2xxx/CVE-2020-2668.json
	modified:   2020/2xxx/CVE-2020-2669.json
	modified:   2020/2xxx/CVE-2020-2670.json
	modified:   2020/2xxx/CVE-2020-2671.json
	modified:   2020/2xxx/CVE-2020-2672.json
	modified:   2020/2xxx/CVE-2020-2673.json
	modified:   2020/2xxx/CVE-2020-2674.json
	modified:   2020/2xxx/CVE-2020-2675.json
	modified:   2020/2xxx/CVE-2020-2676.json
	modified:   2020/2xxx/CVE-2020-2677.json
	modified:   2020/2xxx/CVE-2020-2678.json
	modified:   2020/2xxx/CVE-2020-2679.json
	modified:   2020/2xxx/CVE-2020-2680.json
	modified:   2020/2xxx/CVE-2020-2681.json
	modified:   2020/2xxx/CVE-2020-2682.json
	modified:   2020/2xxx/CVE-2020-2683.json
	modified:   2020/2xxx/CVE-2020-2684.json
	modified:   2020/2xxx/CVE-2020-2685.json
	modified:   2020/2xxx/CVE-2020-2686.json
	modified:   2020/2xxx/CVE-2020-2687.json
	modified:   2020/2xxx/CVE-2020-2688.json
	modified:   2020/2xxx/CVE-2020-2689.json
	modified:   2020/2xxx/CVE-2020-2690.json
	modified:   2020/2xxx/CVE-2020-2691.json
	modified:   2020/2xxx/CVE-2020-2692.json
	modified:   2020/2xxx/CVE-2020-2693.json
	modified:   2020/2xxx/CVE-2020-2694.json
	modified:   2020/2xxx/CVE-2020-2695.json
	modified:   2020/2xxx/CVE-2020-2696.json
	modified:   2020/2xxx/CVE-2020-2697.json
	modified:   2020/2xxx/CVE-2020-2698.json
	modified:   2020/2xxx/CVE-2020-2699.json
	modified:   2020/2xxx/CVE-2020-2700.json
	modified:   2020/2xxx/CVE-2020-2701.json
	modified:   2020/2xxx/CVE-2020-2702.json
	modified:   2020/2xxx/CVE-2020-2703.json
	modified:   2020/2xxx/CVE-2020-2704.json
	modified:   2020/2xxx/CVE-2020-2705.json
	modified:   2020/2xxx/CVE-2020-2707.json
	modified:   2020/2xxx/CVE-2020-2709.json
	modified:   2020/2xxx/CVE-2020-2710.json
	modified:   2020/2xxx/CVE-2020-2711.json
	modified:   2020/2xxx/CVE-2020-2712.json
	modified:   2020/2xxx/CVE-2020-2713.json
	modified:   2020/2xxx/CVE-2020-2714.json
	modified:   2020/2xxx/CVE-2020-2715.json
	modified:   2020/2xxx/CVE-2020-2716.json
	modified:   2020/2xxx/CVE-2020-2717.json
	modified:   2020/2xxx/CVE-2020-2718.json
	modified:   2020/2xxx/CVE-2020-2719.json
	modified:   2020/2xxx/CVE-2020-2720.json
	modified:   2020/2xxx/CVE-2020-2721.json
	modified:   2020/2xxx/CVE-2020-2722.json
	modified:   2020/2xxx/CVE-2020-2723.json
	modified:   2020/2xxx/CVE-2020-2724.json
	modified:   2020/2xxx/CVE-2020-2725.json
	modified:   2020/2xxx/CVE-2020-2726.json
	modified:   2020/2xxx/CVE-2020-2727.json
	modified:   2020/2xxx/CVE-2020-2728.json
	modified:   2020/2xxx/CVE-2020-2729.json
	modified:   2020/2xxx/CVE-2020-2730.json
	modified:   2020/2xxx/CVE-2020-2731.json
2020-02-07 10:22:41 -08:00

71 lines
3.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2020-2649",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Retail Customer Management and Segmentation Foundation",
"version": {
"version_data": [
{
"version_value": "16.0",
"version_affected": "="
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations). The supported version that is affected is 16.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Retail Customer Management and Segmentation Foundation executes to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)."
}
]
},
"impact": {
"cvss": {
"baseScore": "3.3",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Retail Customer Management and Segmentation Foundation executes to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
}
]
}
}