2024-07-14 02:06:08 +00:00

119 lines
3.7 KiB
JSON

{
"id": "CVE-2012-1674",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2012-05-03T22:55:02.170",
"lastModified": "2017-12-07T02:29:11.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Siebel Clinical component in Oracle Industry Applications 7.7, 7.8, 8.0.0.x, 8.1.1.x, and 8.2.2.x allows remote authenticated users to affect integrity via unknown vectors related to Web UI, a different vulnerability than CVE-2012-0582."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente Siebel Clinical en Oracle Industry Applications 7.7, 7.8, 8.0.0.x, 8.1.1.x y 8.2.2.x permite a usuarios remotos autenticados afectar a la integridad de vectores desconocidos relacionados con Web UI, una vulnerabilidad diferente a CVE-2012-0582."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:industry_applications:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3245851D-9CFC-4407-BBE6-6DF2321706F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:industry_applications:7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1F65778E-654D-4DE7-ABF4-A5E4A3EFB2F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:industry_applications:8.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7AAE2F78-EF1E-4E3F-80BF-4B4BF13AC611"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:industry_applications:8.1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1528AE6-4294-4387-B52E-416657DD4CEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:industry_applications:8.2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "377D2C7A-4600-472B-8192-1AB07C8EAD24"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/48885",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1026952",
"source": "secalert_us@oracle.com"
}
]
}