Vulnerability Details : CVE-2010-4434
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft and JDEdwards Suite 8.50.0 through 8.50.14 and 8.51.0 through 8.51.04 allows remote authenticated users to affect confidentiality via unknown vectors related to Portal.
Exploit prediction scoring system (EPSS) score for CVE-2010-4434
Probability of exploitation activity in the next 30 days: 0.37%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 69 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-4434
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
References for CVE-2010-4434
-
http://www.securitytracker.com/id?1024978
Oracle PeopleSoft PeopleTools and JDEdwards Bugs Let Remote Users Partially Deny Service, Access Data, and Modify Data - SecurityTracker
-
http://www.vupen.com/english/advisories/2011/0147
Webmail | OVH- OVH
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/64788
Oracle PeopleSoft Enterprise PeopleTools Portal information disclosure CVE-2010-4434 Vulnerability Report
-
http://www.securityfocus.com/bid/45899
Oracle PeopleSoft CVE-2010-4434 Remote Enterprise PeopleTools Vulnerability
-
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
Oracle Critical Patch Update - January 2011Vendor Advisory
Products affected by CVE-2010-4434
- cpe:2.3:a:oracle:peoplesoft_enterprise:8.51.04:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:peoplesoft_enterprise:8.50.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:peoplesoft_enterprise:8.50.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:peoplesoft_enterprise:8.51.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.50.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.50.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.51.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.51.04:*:*:*:*:*:*:*