{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:12:05.417","vulnerabilities":[{"cve":{"id":"CVE-2019-2621","sourceIdentifier":"secalert_us@oracle.com","published":"2019-04-23T19:32:51.913","lastModified":"2024-11-21T04:41:13.973","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Diagnostics). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente Oracle Application Object Library de Oracle E-Business Suite (subcomponente: Diagnóstico). Las versiones compatibles que están impactadas son 12.1.3, 12.2.3, versión 12.2.4, versión 12.2.5, versión 12.2.6, versión 12.2.7 y versión 12.2.8. Una vulnerabilidad fácilmente explotable que permite a un atacante no autenticado con acceso a la red por medio de HTTP poner en peligro la  Oracle Application Object Library.  Los ataques con éxito requieren la interacción humana de otra persona que no sea el atacante y, si bien la vulnerabilidad está en la Oracle Application Object Library, los ataques pueden impactar significativamente a productos adicionales. Los ataques con éxito de esta vulnerabilidad pueden conllevar a actualizaciones no autorizadas, introducir o suprimir el acceso a algunos de los datos accesibles de la Oracle Application Object Library. CVSS versión 3.0 Base Score versión 4.7 (Impactos de integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_object_library:12.1.3:*:*:*:*:*:*:*","matchCriteriaId":"F7A59435-A033-48BD-AC2A-140DCF6113DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_object_library:12.2.3:*:*:*:*:*:*:*","matchCriteriaId":"73BD1423-F7EE-4B53-AE4B-DFA784F685C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_object_library:12.2.4:*:*:*:*:*:*:*","matchCriteriaId":"C95FED83-21C8-4035-BB1B-3C8A93D4645F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_object_library:12.2.5:*:*:*:*:*:*:*","matchCriteriaId":"411C3C4C-5513-4F7D-8D58-A39F21F43637"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_object_library:12.2.6:*:*:*:*:*:*:*","matchCriteriaId":"3118706C-CD62-4E5A-9846-F083ECA5B799"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_object_library:12.2.7:*:*:*:*:*:*:*","matchCriteriaId":"703E9DDC-8399-460B-95C3-90602BE65989"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_object_library:12.2.8:*:*:*:*:*:*:*","matchCriteriaId":"8578F31E-5D8E-420A-8062-5E622F293C48"}]}]}],"references":[{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}