{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T09:55:05.344","vulnerabilities":[{"cve":{"id":"CVE-2011-0836","sourceIdentifier":"secalert_us@oracle.com","published":"2011-04-20T10:55:01.713","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Oracle JD Edwards EnterpriseOne Tools 8.9 GA through 8.98.4.1 and OneWorld Tools through 24.1.3 allows remote authenticated users to affect integrity, related to Web Runtime SEC."},{"lang":"es","value":"Vulnerabilidad sin especificar en Oracle JD Edwards EnterpriseOne Tools 8.9 GA hasta la 8.98.4.1 y OneWorld Tools hasta la 24.1.3 permite a usuarios autenticados remotos vulnerar la integridad, relacionado con \"Web Runtime SEC\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:enterpriseone_tools:8.9:*:*:*:*:*:*:*","matchCriteriaId":"78A56CBF-DD52-4EC9-942D-062A2D5D4BD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:budle14:*:*:*:*:*:*","matchCriteriaId":"F2359221-692F-4226-B8BB-A045F4926DC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle14:*:*:*:*:*:*","matchCriteriaId":"42F9F31D-3074-4418-9566-5DB6C4367EF8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle21:*:*:*:*:*:*","matchCriteriaId":"FA157884-D3C3-4866-BF66-AA10F93AF433"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle9:*:*:*:*:*:*","matchCriteriaId":"DF51E618-EFF1-4978-8BFC-B845C8F664D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9.18:*:*:*:*:*:*:*","matchCriteriaId":"F2332EAE-75EE-415D-84A6-FE0A19D2C71B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.1.4:*:*:*:*:*:*:*","matchCriteriaId":"768E4605-1871-435B-8FB6-DDFBD17355CA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.2.1:*:*:*:*:*:*:*","matchCriteriaId":"8DB2A4D7-4E33-42DC-ABA1-7F0C035974ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jd_edwards_enterpriseone_ep:8.9:*:*:*:*:*:*:*","matchCriteriaId":"B73DAAFF-035F-4414-9A96-6A6862378FF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oneworld_tools:*:*:*:*:*:*:*:*","versionEndIncluding":"24.1.3","matchCriteriaId":"DE3F787C-209A-44A4-8637-2614AC4F4B0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:*:*:*:*:*:*:*","matchCriteriaId":"B402D231-6B6D-4AC6-ABE8-BD4A0D3E5D4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle23:*:*:*:*:*:*","matchCriteriaId":"1A87B7C8-AD97-4AF1-A1B9-8B9D27D7B19D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle37:*:*:*:*:*:*","matchCriteriaId":"DFF93D30-685A-45FA-A792-D4D3280F064D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle38:*:*:*:*:*:*","matchCriteriaId":"153DA309-9ADA-44D2-A4B8-AAA2B0A5CDAB"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle41:*:*:*:*:*:*","matchCriteriaId":"1C51AFAB-4D6B-4A74-8EBF-4D246AFE3937"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:gp_2010-e:*:*:*:*:*:*","matchCriteriaId":"E9C90A6C-A6C3-4AFD-901A-9BC3FCE47FD9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.98.4.1:*:*:*:*:*:*:*","matchCriteriaId":"6FB06098-BD09-43CB-988A-AC2C03B6A0C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_suite_scm:8.9:bundle37:*:*:*:*:*:*","matchCriteriaId":"AEC26BC4-778F-42BE-926F-AE9FC7394278"}]}]}],"references":[{"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}