cvelist/2020/2xxx/CVE-2020-2563.json
Bill Situ ec2f96b090 Bill Situ <Bill.Situ@Oracle.com>
Add impact field to CVE in Oracle 2020 January Critical Patch Updates

 On branch cna/Oracle/CPU2020JanCVSS
 Changes to be committed:
	modified:   2012/1xxx/CVE-2012-1695.json
	modified:   2019/2xxx/CVE-2019-2725.json
	modified:   2019/2xxx/CVE-2019-2729.json
	modified:   2019/2xxx/CVE-2019-2904.json
	modified:   2020/2xxx/CVE-2020-2510.json
	modified:   2020/2xxx/CVE-2020-2511.json
	modified:   2020/2xxx/CVE-2020-2512.json
	modified:   2020/2xxx/CVE-2020-2515.json
	modified:   2020/2xxx/CVE-2020-2516.json
	modified:   2020/2xxx/CVE-2020-2517.json
	modified:   2020/2xxx/CVE-2020-2518.json
	modified:   2020/2xxx/CVE-2020-2519.json
	modified:   2020/2xxx/CVE-2020-2527.json
	modified:   2020/2xxx/CVE-2020-2530.json
	modified:   2020/2xxx/CVE-2020-2531.json
	modified:   2020/2xxx/CVE-2020-2533.json
	modified:   2020/2xxx/CVE-2020-2534.json
	modified:   2020/2xxx/CVE-2020-2535.json
	modified:   2020/2xxx/CVE-2020-2536.json
	modified:   2020/2xxx/CVE-2020-2537.json
	modified:   2020/2xxx/CVE-2020-2538.json
	modified:   2020/2xxx/CVE-2020-2539.json
	modified:   2020/2xxx/CVE-2020-2540.json
	modified:   2020/2xxx/CVE-2020-2541.json
	modified:   2020/2xxx/CVE-2020-2542.json
	modified:   2020/2xxx/CVE-2020-2543.json
	modified:   2020/2xxx/CVE-2020-2544.json
	modified:   2020/2xxx/CVE-2020-2545.json
	modified:   2020/2xxx/CVE-2020-2546.json
	modified:   2020/2xxx/CVE-2020-2547.json
	modified:   2020/2xxx/CVE-2020-2548.json
	modified:   2020/2xxx/CVE-2020-2549.json
	modified:   2020/2xxx/CVE-2020-2550.json
	modified:   2020/2xxx/CVE-2020-2551.json
	modified:   2020/2xxx/CVE-2020-2552.json
	modified:   2020/2xxx/CVE-2020-2555.json
	modified:   2020/2xxx/CVE-2020-2556.json
	modified:   2020/2xxx/CVE-2020-2557.json
	modified:   2020/2xxx/CVE-2020-2558.json
	modified:   2020/2xxx/CVE-2020-2559.json
	modified:   2020/2xxx/CVE-2020-2560.json
	modified:   2020/2xxx/CVE-2020-2561.json
	modified:   2020/2xxx/CVE-2020-2563.json
	modified:   2020/2xxx/CVE-2020-2564.json
	modified:   2020/2xxx/CVE-2020-2565.json
	modified:   2020/2xxx/CVE-2020-2566.json
	modified:   2020/2xxx/CVE-2020-2567.json
	modified:   2020/2xxx/CVE-2020-2568.json
	modified:   2020/2xxx/CVE-2020-2569.json
	modified:   2020/2xxx/CVE-2020-2570.json
	modified:   2020/2xxx/CVE-2020-2571.json
	modified:   2020/2xxx/CVE-2020-2572.json
	modified:   2020/2xxx/CVE-2020-2573.json
	modified:   2020/2xxx/CVE-2020-2574.json
	modified:   2020/2xxx/CVE-2020-2576.json
	modified:   2020/2xxx/CVE-2020-2577.json
	modified:   2020/2xxx/CVE-2020-2578.json
	modified:   2020/2xxx/CVE-2020-2579.json
	modified:   2020/2xxx/CVE-2020-2580.json
	modified:   2020/2xxx/CVE-2020-2581.json
	modified:   2020/2xxx/CVE-2020-2582.json
	modified:   2020/2xxx/CVE-2020-2583.json
	modified:   2020/2xxx/CVE-2020-2584.json
	modified:   2020/2xxx/CVE-2020-2585.json
	modified:   2020/2xxx/CVE-2020-2586.json
	modified:   2020/2xxx/CVE-2020-2587.json
	modified:   2020/2xxx/CVE-2020-2588.json
	modified:   2020/2xxx/CVE-2020-2589.json
	modified:   2020/2xxx/CVE-2020-2590.json
	modified:   2020/2xxx/CVE-2020-2591.json
	modified:   2020/2xxx/CVE-2020-2592.json
	modified:   2020/2xxx/CVE-2020-2593.json
	modified:   2020/2xxx/CVE-2020-2595.json
	modified:   2020/2xxx/CVE-2020-2596.json
	modified:   2020/2xxx/CVE-2020-2597.json
	modified:   2020/2xxx/CVE-2020-2598.json
	modified:   2020/2xxx/CVE-2020-2599.json
	modified:   2020/2xxx/CVE-2020-2600.json
	modified:   2020/2xxx/CVE-2020-2601.json
	modified:   2020/2xxx/CVE-2020-2602.json
	modified:   2020/2xxx/CVE-2020-2603.json
	modified:   2020/2xxx/CVE-2020-2604.json
	modified:   2020/2xxx/CVE-2020-2605.json
	modified:   2020/2xxx/CVE-2020-2606.json
	modified:   2020/2xxx/CVE-2020-2607.json
	modified:   2020/2xxx/CVE-2020-2608.json
	modified:   2020/2xxx/CVE-2020-2609.json
	modified:   2020/2xxx/CVE-2020-2610.json
	modified:   2020/2xxx/CVE-2020-2611.json
	modified:   2020/2xxx/CVE-2020-2612.json
	modified:   2020/2xxx/CVE-2020-2613.json
	modified:   2020/2xxx/CVE-2020-2614.json
	modified:   2020/2xxx/CVE-2020-2615.json
	modified:   2020/2xxx/CVE-2020-2616.json
	modified:   2020/2xxx/CVE-2020-2617.json
	modified:   2020/2xxx/CVE-2020-2618.json
	modified:   2020/2xxx/CVE-2020-2619.json
	modified:   2020/2xxx/CVE-2020-2620.json
	modified:   2020/2xxx/CVE-2020-2621.json
	modified:   2020/2xxx/CVE-2020-2622.json
	modified:   2020/2xxx/CVE-2020-2623.json
	modified:   2020/2xxx/CVE-2020-2624.json
	modified:   2020/2xxx/CVE-2020-2625.json
	modified:   2020/2xxx/CVE-2020-2626.json
	modified:   2020/2xxx/CVE-2020-2627.json
	modified:   2020/2xxx/CVE-2020-2628.json
	modified:   2020/2xxx/CVE-2020-2629.json
	modified:   2020/2xxx/CVE-2020-2630.json
	modified:   2020/2xxx/CVE-2020-2631.json
	modified:   2020/2xxx/CVE-2020-2632.json
	modified:   2020/2xxx/CVE-2020-2633.json
	modified:   2020/2xxx/CVE-2020-2634.json
	modified:   2020/2xxx/CVE-2020-2635.json
	modified:   2020/2xxx/CVE-2020-2636.json
	modified:   2020/2xxx/CVE-2020-2637.json
	modified:   2020/2xxx/CVE-2020-2638.json
	modified:   2020/2xxx/CVE-2020-2639.json
	modified:   2020/2xxx/CVE-2020-2640.json
	modified:   2020/2xxx/CVE-2020-2641.json
	modified:   2020/2xxx/CVE-2020-2642.json
	modified:   2020/2xxx/CVE-2020-2643.json
	modified:   2020/2xxx/CVE-2020-2644.json
	modified:   2020/2xxx/CVE-2020-2645.json
	modified:   2020/2xxx/CVE-2020-2646.json
	modified:   2020/2xxx/CVE-2020-2647.json
	modified:   2020/2xxx/CVE-2020-2648.json
	modified:   2020/2xxx/CVE-2020-2649.json
	modified:   2020/2xxx/CVE-2020-2650.json
	modified:   2020/2xxx/CVE-2020-2651.json
	modified:   2020/2xxx/CVE-2020-2652.json
	modified:   2020/2xxx/CVE-2020-2653.json
	modified:   2020/2xxx/CVE-2020-2654.json
	modified:   2020/2xxx/CVE-2020-2655.json
	modified:   2020/2xxx/CVE-2020-2656.json
	modified:   2020/2xxx/CVE-2020-2657.json
	modified:   2020/2xxx/CVE-2020-2658.json
	modified:   2020/2xxx/CVE-2020-2659.json
	modified:   2020/2xxx/CVE-2020-2660.json
	modified:   2020/2xxx/CVE-2020-2661.json
	modified:   2020/2xxx/CVE-2020-2662.json
	modified:   2020/2xxx/CVE-2020-2663.json
	modified:   2020/2xxx/CVE-2020-2664.json
	modified:   2020/2xxx/CVE-2020-2665.json
	modified:   2020/2xxx/CVE-2020-2666.json
	modified:   2020/2xxx/CVE-2020-2667.json
	modified:   2020/2xxx/CVE-2020-2668.json
	modified:   2020/2xxx/CVE-2020-2669.json
	modified:   2020/2xxx/CVE-2020-2670.json
	modified:   2020/2xxx/CVE-2020-2671.json
	modified:   2020/2xxx/CVE-2020-2672.json
	modified:   2020/2xxx/CVE-2020-2673.json
	modified:   2020/2xxx/CVE-2020-2674.json
	modified:   2020/2xxx/CVE-2020-2675.json
	modified:   2020/2xxx/CVE-2020-2676.json
	modified:   2020/2xxx/CVE-2020-2677.json
	modified:   2020/2xxx/CVE-2020-2678.json
	modified:   2020/2xxx/CVE-2020-2679.json
	modified:   2020/2xxx/CVE-2020-2680.json
	modified:   2020/2xxx/CVE-2020-2681.json
	modified:   2020/2xxx/CVE-2020-2682.json
	modified:   2020/2xxx/CVE-2020-2683.json
	modified:   2020/2xxx/CVE-2020-2684.json
	modified:   2020/2xxx/CVE-2020-2685.json
	modified:   2020/2xxx/CVE-2020-2686.json
	modified:   2020/2xxx/CVE-2020-2687.json
	modified:   2020/2xxx/CVE-2020-2688.json
	modified:   2020/2xxx/CVE-2020-2689.json
	modified:   2020/2xxx/CVE-2020-2690.json
	modified:   2020/2xxx/CVE-2020-2691.json
	modified:   2020/2xxx/CVE-2020-2692.json
	modified:   2020/2xxx/CVE-2020-2693.json
	modified:   2020/2xxx/CVE-2020-2694.json
	modified:   2020/2xxx/CVE-2020-2695.json
	modified:   2020/2xxx/CVE-2020-2696.json
	modified:   2020/2xxx/CVE-2020-2697.json
	modified:   2020/2xxx/CVE-2020-2698.json
	modified:   2020/2xxx/CVE-2020-2699.json
	modified:   2020/2xxx/CVE-2020-2700.json
	modified:   2020/2xxx/CVE-2020-2701.json
	modified:   2020/2xxx/CVE-2020-2702.json
	modified:   2020/2xxx/CVE-2020-2703.json
	modified:   2020/2xxx/CVE-2020-2704.json
	modified:   2020/2xxx/CVE-2020-2705.json
	modified:   2020/2xxx/CVE-2020-2707.json
	modified:   2020/2xxx/CVE-2020-2709.json
	modified:   2020/2xxx/CVE-2020-2710.json
	modified:   2020/2xxx/CVE-2020-2711.json
	modified:   2020/2xxx/CVE-2020-2712.json
	modified:   2020/2xxx/CVE-2020-2713.json
	modified:   2020/2xxx/CVE-2020-2714.json
	modified:   2020/2xxx/CVE-2020-2715.json
	modified:   2020/2xxx/CVE-2020-2716.json
	modified:   2020/2xxx/CVE-2020-2717.json
	modified:   2020/2xxx/CVE-2020-2718.json
	modified:   2020/2xxx/CVE-2020-2719.json
	modified:   2020/2xxx/CVE-2020-2720.json
	modified:   2020/2xxx/CVE-2020-2721.json
	modified:   2020/2xxx/CVE-2020-2722.json
	modified:   2020/2xxx/CVE-2020-2723.json
	modified:   2020/2xxx/CVE-2020-2724.json
	modified:   2020/2xxx/CVE-2020-2725.json
	modified:   2020/2xxx/CVE-2020-2726.json
	modified:   2020/2xxx/CVE-2020-2727.json
	modified:   2020/2xxx/CVE-2020-2728.json
	modified:   2020/2xxx/CVE-2020-2729.json
	modified:   2020/2xxx/CVE-2020-2730.json
	modified:   2020/2xxx/CVE-2020-2731.json
2020-02-07 10:22:41 -08:00

71 lines
3.0 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2020-2563",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Hyperion Financial Close Management",
"version": {
"version_data": [
{
"version_value": "11.1.2.4",
"version_affected": "="
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the Hyperion Financial Close Management product of Oracle Hyperion (component: Close Manager). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Financial Close Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Financial Close Management accessible data. CVSS 3.0 Base Score 4.2 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N)."
}
]
},
"impact": {
"cvss": {
"baseScore": "4.2",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Financial Close Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Financial Close Management accessible data."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
}
]
}
}