2024-12-08 03:06:42 +00:00

128 lines
4.2 KiB
JSON

{
"id": "CVE-2015-2605",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2015-07-16T10:59:30.757",
"lastModified": "2024-11-21T02:27:41.753",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2602, CVE-2015-2603, CVE-2015-2604, CVE-2015-2606, and CVE-2015-4745."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente Oracle Endeca Information Discovery Studio en Oracle Fusion Middleware de las versiones 2.2.2, 2.3, 2.4, 3.0 y 3.1, permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores desconocidos relacionados con Integrator, una vulnerabilidad diferente a CVE-2015-2602, CVE-2015-2603, CVE-2015-2604, CVE-2015-2605 y CVE-2015-4745."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AC598861-09D2-4900-AC3B-5731BF651389"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D0881A7A-CCCD-4369-AD26-883D7465AC25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F85001B9-3015-4D2F-A111-13021BF87ACD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBA36EC-3C17-49D6-99B3-41B267FB16DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AEAF27D4-9744-44FD-9368-9471FCC3769C"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75756",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-353",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75756",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-353",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}