2024-12-08 03:06:42 +00:00

166 lines
4.9 KiB
JSON

{
"id": "CVE-2016-5450",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2016-07-21T10:15:06.037",
"lastModified": "2024-11-21T02:54:20.430",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1, 8.2.2, IP2014, IP2015, and IP2016 allows remote attackers to affect integrity via vectors related to UIF Open UI."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente Siebel UI Framework en Oracle Siebel CRM 8.1.1, 8.2.2, IP2014, IP2015 e IP2016 permite a atacantes remotos afectar la integridad a trav\u00e9s de vectores relacionadods con UIF Open UI."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:siebel_ui_framework:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3548AC23-D3AF-4202-9F87-C9A29A56B376"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:siebel_ui_framework:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "14EF3E4D-FC8E-446B-A2FD-621A20578ED2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:siebel_ui_framework:2014:*:*:*:*:*:*:*",
"matchCriteriaId": "3B95DDDC-735E-46DA-8975-4C6C7B8C2012"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:siebel_ui_framework:2015:*:*:*:*:*:*:*",
"matchCriteriaId": "888FB996-71B2-47F4-A98F-54DF8E88B067"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:siebel_ui_framework:2016:*:*:*:*:*:*:*",
"matchCriteriaId": "D39F613D-E2B6-4ECE-A3A6-3C4E7DC7503A"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91787",
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/91981",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.securitytracker.com/id/1036400",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/91787",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/91981",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id/1036400",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}