Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:oracle:enterpriseone_tools:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "78A56CBF-DD52-4EC9-942D-062A2D5D4BD5", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:budle14:*:*:*:*:*:*", "matchCriteriaId": "F2359221-692F-4226-B8BB-A045F4926DC8", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle14:*:*:*:*:*:*", "matchCriteriaId": "42F9F31D-3074-4418-9566-5DB6C4367EF8", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle21:*:*:*:*:*:*", "matchCriteriaId": "FA157884-D3C3-4866-BF66-AA10F93AF433", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9:bundle9:*:*:*:*:*:*", "matchCriteriaId": "DF51E618-EFF1-4978-8BFC-B845C8F664D8", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "F2332EAE-75EE-415D-84A6-FE0A19D2C71B", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "768E4605-1871-435B-8FB6-DDFBD17355CA", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8DB2A4D7-4E33-42DC-ABA1-7F0C035974ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_ep:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "B73DAAFF-035F-4414-9A96-6A6862378FF0", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:oneworld_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE3F787C-209A-44A4-8637-2614AC4F4B0E", "versionEndIncluding": "24.1.3", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "B402D231-6B6D-4AC6-ABE8-BD4A0D3E5D4B", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle23:*:*:*:*:*:*", "matchCriteriaId": "1A87B7C8-AD97-4AF1-A1B9-8B9D27D7B19D", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle37:*:*:*:*:*:*", "matchCriteriaId": "DFF93D30-685A-45FA-A792-D4D3280F064D", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle38:*:*:*:*:*:*", "matchCriteriaId": "153DA309-9ADA-44D2-A4B8-AAA2B0A5CDAB", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle41:*:*:*:*:*:*", "matchCriteriaId": "1C51AFAB-4D6B-4A74-8EBF-4D246AFE3937", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:gp_2010-e:*:*:*:*:*:*", "matchCriteriaId": "E9C90A6C-A6C3-4AFD-901A-9BC3FCE47FD9", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.98.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FB06098-BD09-43CB-988A-AC2C03B6A0C8", "vulnerable": true}, {"criteria": "cpe:2.3:a:oracle:peoplesoft_and_jdedwards_suite_scm:8.9:bundle37:*:*:*:*:*:*", "matchCriteriaId": "AEC26BC4-778F-42BE-926F-AE9FC7394278", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in Oracle JD Edwards EnterpriseOne Tools 8.9 GA through 8.98.4.1 and OneWorld Tools through 24.1.3 allows remote attackers to affect integrity, related to Enterprise Infrastructure SEC, a different vulnerability than CVE-2011-0819."}, {"lang": "es", "value": "Vulnerabilidad no especificada en Oracle JD Edwards EnterpriseOne Tools 8.9 GA hasta la versi\u00f3n 8.98.4.1 y OneWorld Tools hasta la versi\u00f3n 24.1.3 permite a atacantes remotos afectar la integridad, relacionado con Enterprise Infrastructure SEC, una vulnerabilidad diferente a CVE-2011-0819."}], "id": "CVE-2011-0823", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-04-20T10:55:01.387", "references": [{"source": "secalert_us@oracle.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"}], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}