95 lines
3.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2009-1993",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2009-10-22T18:30:00.500",
"lastModified": "2012-10-23T03:07:31.023",
"vulnStatus": "Modified",
"evaluatorImpact": "Per: http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2009.html\r\n\r\n\"Overview of Oracle Application Express\r\n\r\nOracle Application Express is a rapid web application development tool for the Oracle Database. In Oracle Database releases up to and including 10g Release 2, Oracle Application Express was separately installed from a Companion CD supplied with the Oracle Database CD set or from a package downloaded from an Oracle web site. If you have not installed Oracle Application Express from the companion CD or from a packaged download from an Oracle web site, no further action is required. From Oracle Database 11g onwards, Oracle Application Express is included in the default installation of the Oracle Database.\r\n\r\nIf you have Oracle Application Express installed in an Oracle Database home, then refer to Critical Patch Update October 2009 Patch Availability Document for Oracle Products, My Oracle Support Note 881382.1 for the version to be installed. \"",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Application Express component in Oracle Database 3.0.1 allows remote authenticated users to affect confidentiality and integrity, related to FLOWS_030000.WWV_EXECUTE_IMMEDIATE."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en el componente Application Express en Oracle Database v3.0.1, permite a usuarios autenticados remotamente comprometer la confidencialidad e integridad. Relacionado con el FLOWS_030000.WWV_EXECUTE_IMMEDIATE."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:database_server:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A8C4BDA-F35D-416B-8C19-BE75DE4CF664"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.securityfocus.com/bid/36759",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.securitytracker.com/id?1023057",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html",
"source": "secalert_us@oracle.com",
"tags": [
"US Government Resource"
]
}
]
}