Show plain JSON{"id": "CVE-2003-1193", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2003-11-03T05:00:00.000", "references": [{"url": "http://otn.oracle.com/deploy/security/pdf/2003alert61.pdf", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/343520", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/8966", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13593", "source": "cve@mitre.org"}, {"url": "http://otn.oracle.com/deploy/security/pdf/2003alert61.pdf", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/343520", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/8966", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13593", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in the Portal DB (1) List of Values (LOVs), (2) Forms, (3) Hierarchy, and (4) XML components packages in Oracle Oracle9i Application Server 9.0.2.00 through 3.0.9.8.5 allow remote attackers to execute arbitrary SQL commands via the URL."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oracle:application_server_portal:3.0.9.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CB7896F-B5E6-4182-85F0-11A04A16F961"}, {"criteria": "cpe:2.3:a:oracle:application_server_portal:9.0.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFEBABBB-DC11-4A8B-8C8A-A05D144F11A5"}, {"criteria": "cpe:2.3:a:oracle:application_server_portal:9.0.2.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C5E7916-B077-4EE8-AD9E-FA118019E035"}, {"criteria": "cpe:2.3:a:oracle:application_server_portal:9.0.2.3b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F03E1EB3-EB24-4A18-9DA1-AB6243C48221"}, {"criteria": "cpe:2.3:a:oracle:oracle9i:9.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "330BE6F7-144F-4188-84A4-6597AED71024"}, {"criteria": "cpe:2.3:a:oracle:oracle9i:9.0.2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED7598BA-C4F9-46C7-A90D-F80697EA9E4A"}, {"criteria": "cpe:2.3:a:oracle:oracle9i:9.0.2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D52D7F1A-7ADF-439B-9FF6-BF0D18CEF3A5"}, {"criteria": "cpe:2.3:a:oracle:oracle9i:9.0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBAA75E1-6ED1-400E-9BBE-1890D7D0FA28"}, {"criteria": "cpe:2.3:a:oracle:oracle9i:9.0.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D24685E-293E-4292-A7FC-E463723FFA9D"}, {"criteria": "cpe:2.3:a:oracle:oracle9i:9.0.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A1207BD-F50A-4E5E-89E8-E016AF356149"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}