Show plain JSON{"id": "CVE-2013-0393", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-01-17T01:55:05.563", "references": [{"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", "source": "secalert_us@oracle.com"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "source": "secalert_us@oracle.com"}, {"url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "tags": ["Vendor Advisory"], "source": "secalert_us@oracle.com"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html", "tags": ["US Government Resource"], "source": "secalert_us@oracle.com"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-012", "source": "secalert_us@oracle.com"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16202", "source": "secalert_us@oracle.com"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-012", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16202", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7 and 8.4 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-0418."}, {"lang": "es", "value": "Una vulnerabilidad no especificada en el componente Oracle Outside In Technology de Oracle Fusion Middleware v8.3.7 y v8.4 permite afectar a la disponibilidad a atacantes, dependientes de contexto, a trav\u00e9s de vectores desconocidos relacionados con Outside In Filters. Se trata de una vulnerabilidad diferente a CVE-2013-0418."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:oracle:fusion_middleware:8.3.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85A2AD03-E0CC-47CA-98B2-2268B7597657"}, {"criteria": "cpe:2.3:a:oracle:fusion_middleware:8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6E6B223-84C4-4351-B6A8-CD911DAFE248"}], "operator": "OR"}]}], "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html\r\n\r\n'2. Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.\"", "sourceIdentifier": "secalert_us@oracle.com"}