mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
126 lines
4.4 KiB
JSON
126 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2015-0465",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2015-04-16T16:59:22.223",
|
|
"lastModified": "2017-01-03T02:59:37.583",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, and 6.3.6 allows remote authenticated users to affect confidentiality via unknown vectors related to UI Infrastructure."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en el componente Oracle Transportation Management en Oracle Supply Chain Products Suite 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, y 6.3.6 permite a usuarios remotos autenticados afectar la confidencialidad a trav\u00e9s de vectores desconocidos relacionados con la infraestructura de la UI."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AD2CCA6E-5F9B-499C-A4FB-D14A42A822D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D4C8E58-FD8C-4269-98B2-FAB85271C9C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FA22F51B-5D1B-4B94-B8ED-6AF30B80EB43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F30344A5-25A3-4335-9FED-795AC9F60852"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C7090DC-DDC0-4C26-9B00-F63163E5A3C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8348194-D745-4ED2-B9DF-B2004EE35F8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A955B09E-863E-4B7C-96F6-ED4887AD497B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97188E2A-B205-452F-A1B8-2BF0DB6769F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.3.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68540EB3-D949-40ED-BAA0-B4BF5E062247"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1032124",
|
|
"source": "secalert_us@oracle.com"
|
|
}
|
|
]
|
|
} |