René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

169 lines
6.4 KiB
JSON

{
"id": "CVE-2011-0803",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2011-04-20T03:14:06.003",
"lastModified": "2011-04-20T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the JD Edwards EnterpriseOne Tools component in Oracle JD Edwards Products 8.9 GA through 8.98.4.1, and OneWorld Tools through 24.1.3, allows remote attackers to affect integrity and availability, related to Enterprise Infrastructure SEC."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente de JD Edwards EnterpriseOne de Oracle JD Edwards Products v8.9 GA hasta v8.98.4.1, y OneWorld Tools hasta v24.1.3, permite a atacantes remotos afectar a la integridad y disponibilidad, en relaci\u00f3n con Enterprise Infrastructure SEC."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:enterpriseone_tools:8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "78A56CBF-DD52-4EC9-942D-062A2D5D4BD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:budle14:*:*:*:*:*:*",
"matchCriteriaId": "F2359221-692F-4226-B8BB-A045F4926DC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle14:*:*:*:*:*:*",
"matchCriteriaId": "42F9F31D-3074-4418-9566-5DB6C4367EF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle21:*:*:*:*:*:*",
"matchCriteriaId": "FA157884-D3C3-4866-BF66-AA10F93AF433"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle9:*:*:*:*:*:*",
"matchCriteriaId": "DF51E618-EFF1-4978-8BFC-B845C8F664D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F2332EAE-75EE-415D-84A6-FE0A19D2C71B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "768E4605-1871-435B-8FB6-DDFBD17355CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DB2A4D7-4E33-42DC-ABA1-7F0C035974ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_ep:8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B73DAAFF-035F-4414-9A96-6A6862378FF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:oneworld_tools:*:*:*:*:*:*:*:*",
"versionEndIncluding": "24.1.3",
"matchCriteriaId": "DE3F787C-209A-44A4-8637-2614AC4F4B0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B402D231-6B6D-4AC6-ABE8-BD4A0D3E5D4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle23:*:*:*:*:*:*",
"matchCriteriaId": "1A87B7C8-AD97-4AF1-A1B9-8B9D27D7B19D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle37:*:*:*:*:*:*",
"matchCriteriaId": "DFF93D30-685A-45FA-A792-D4D3280F064D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle38:*:*:*:*:*:*",
"matchCriteriaId": "153DA309-9ADA-44D2-A4B8-AAA2B0A5CDAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle41:*:*:*:*:*:*",
"matchCriteriaId": "1C51AFAB-4D6B-4A74-8EBF-4D246AFE3937"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:gp_2010-e:*:*:*:*:*:*",
"matchCriteriaId": "E9C90A6C-A6C3-4AFD-901A-9BC3FCE47FD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.98.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB06098-BD09-43CB-988A-AC2C03B6A0C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_suite_scm:8.9:bundle37:*:*:*:*:*:*",
"matchCriteriaId": "AEC26BC4-778F-42BE-926F-AE9FC7394278"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}