{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T03:18:57.296","vulnerabilities":[{"cve":{"id":"CVE-2019-2941","sourceIdentifier":"secalert_us@oracle.com","published":"2019-10-16T18:15:29.653","lastModified":"2024-11-21T04:41:50.080","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Hyperion Profitability and Cost Management product of Oracle Hyperion (component: Modeling). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Profitability and Cost Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Hyperion Profitability and Cost Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion Profitability and Cost Management accessible data as well as unauthorized read access to a subset of Hyperion Profitability and Cost Management accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N)."},{"lang":"es","value":"Vulnerabilidad en el producto Hyperion de rentabilidad y gestión de costos de Oracle Hyperion (component: Modeling) La versión compatible que está afectada es 11.1.2.4. La vulnerabilidad difícil de explotar permite que un atacante con privilegios elevados y acceso a la red a través de HTTP comprometa la rentabilidad y la gestión de costos de Hyperion. Los ataques con éxito requieren la interacción humana de una persona que no sea el atacante y, si bien la vulnerabilidad se encuentra en la gestión de rentabilidad y costos de Hyperion, los ataques pueden afectar significativamente a productos adicionales. Los ataques con éxito de esta vulnerabilidad pueden dar como resultado una actualización no autorizada, insertar o eliminar el acceso a algunos de los datos accesibles de la Administración de Costos y Rentabilidad de Hyperion, así como el acceso de lectura no autorizado a un subconjunto de datos accesibles de la Administración de Costos y Rentabilidad de Hyperion. CVSS 3.0 Base Score 4.0 (Impactos de confidencialidad e integridad). Vector CVSS: (CVSS: 3.0 / AV: N / AC: H / PR: H / UI: R / S: C / C: L / I: L / A: N)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.0,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:N","baseScore":3.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hyperion_enterprise_performance_management_architect:11.1.2.4:*:*:*:*:*:*:*","matchCriteriaId":"1024E4C8-82AB-4367-9A3C-0C080F2ED7CB"}]}]}],"references":[{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}