FKIE_CVE-2013-5856
Vulnerability from fkie_nvd - Published: 2013-10-16 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, 5.0 SP1a-b, 5.5 SP0, 5.5 SP0b, 5.5.1, and 6.0.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3:*:*:*:*:*:*",
"matchCriteriaId": "B10BFEC6-2670-4EFD-B85A-BED104A9BC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3a:*:*:*:*:*:*",
"matchCriteriaId": "CDE1A413-DB44-4E4F-BA59-C0964584AEEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3b:*:*:*:*:*:*",
"matchCriteriaId": "97359474-6670-4B3E-9A55-AC72B3F60ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3c:*:*:*:*:*:*",
"matchCriteriaId": "C425E290-5587-48D5-AB85-A13A448451A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3d:*:*:*:*:*:*",
"matchCriteriaId": "07EC1B1E-D5D3-494C-BA8F-F14F716E4199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3e:*:*:*:*:*:*",
"matchCriteriaId": "021640B0-C020-4062-955D-820F15550CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3f:*:*:*:*:*:*",
"matchCriteriaId": "47C354AA-5913-4A9F-B875-2BC5719132C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3g:*:*:*:*:*:*",
"matchCriteriaId": "13199F21-B7DD-4060-ACA8-4B2314783EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3h:*:*:*:*:*:*",
"matchCriteriaId": "CECCC113-F3A5-4693-AC6D-26CB78BAA90D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3i:*:*:*:*:*:*",
"matchCriteriaId": "498C032E-CBFC-4259-8BC0-C991C453A8D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3j:*:*:*:*:*:*",
"matchCriteriaId": "A07EE7B2-546C-466D-A8D2-6B5FA65B9A2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.5:sp3k:*:*:*:*:*:*",
"matchCriteriaId": "81E0B356-C447-4F59-B274-24402A121F1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp0:*:*:*:*:*:*",
"matchCriteriaId": "BFB19406-80FB-4D18-B445-1A3E194445B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp0a:*:*:*:*:*:*",
"matchCriteriaId": "4B1A0F23-7783-41C5-BB06-83F23B6C7248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp0b:*:*:*:*:*:*",
"matchCriteriaId": "6C5E1651-62AA-4A41-8581-22502850C95B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp0c:*:*:*:*:*:*",
"matchCriteriaId": "C1DB3615-C594-47A1-9CE5-2DC9689FE1EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp1:*:*:*:*:*:*",
"matchCriteriaId": "6A1BD5FF-334E-4463-8D90-E2B9128177EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp1a:*:*:*:*:*:*",
"matchCriteriaId": "7E01ED61-916A-43E3-8101-3AE70285B4C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp1b:*:*:*:*:*:*",
"matchCriteriaId": "099C1F29-A893-43D0-B781-F6376784FC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp1c:*:*:*:*:*:*",
"matchCriteriaId": "0EE76194-A139-4682-B3C3-E534DEB9699C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp2:*:*:*:*:*:*",
"matchCriteriaId": "75818D5D-6908-46B1-84B1-682EF39D23A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp2a:*:*:*:*:*:*",
"matchCriteriaId": "F165F3DC-7863-4ED9-A9E1-B531FA9DED7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp2b:*:*:*:*:*:*",
"matchCriteriaId": "ACBE2353-CA79-4DB0-83CC-CA3CDAD64EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:4.6:sp2c:*:*:*:*:*:*",
"matchCriteriaId": "56357E79-1A30-43DB-A23C-607F02D1F7F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:5.0:sp0:*:*:*:*:*:*",
"matchCriteriaId": "D0352291-4417-418E-BB65-C0CBFEB47597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:5.0:sp0a:*:*:*:*:*:*",
"matchCriteriaId": "2F0A363C-D521-4B86-B082-E2E78B67B72E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:5.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2E7D2B73-04D6-439F-B139-507BD64C56F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:5.0:sp1a:*:*:*:*:*:*",
"matchCriteriaId": "D831460D-2C83-409D-99E3-FBF25B925ACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:5.0:sp1b:*:*:*:*:*:*",
"matchCriteriaId": "486CC7F5-2EA7-44D4-BD99-52484F484DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:5.5:sp0:*:*:*:*:*:*",
"matchCriteriaId": "9C4C9C5B-5323-41AC-883F-364BE599A41E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:5.5:sp0b:*:*:*:*:*:*",
"matchCriteriaId": "D68F484E-A945-4897-BAA8-ACCA96F8A2F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AEFE3971-9CEE-480E-B4E6-7B1CB988D7C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:industry_applications:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "634C0A94-627F-44EC-A394-AA8A951D60C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, 5.0 SP1a-b, 5.5 SP0, 5.5 SP0b, 5.5.1, and 6.0.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente Oracle Health Sciences InForm en Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, 5.0 SP1a-b, 5.5 SP0, 5.5 SP0b, 5.5.1, y 6.0.0 permite a usuarios remotos autenticados afectar la confidencialidad e integridad a trav\u00e9s de vectores desconocidos relacionados con Web."
}
],
"id": "CVE-2013-5856",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-16T18:55:03.730",
"references": [
{
"source": "secalert_us@oracle.com",
"url": "http://osvdb.org/98493"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.securityfocus.com/bid/63099"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/98493"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/63099"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…