cvelist/2022/21xxx/CVE-2022-21601.json

68 lines
3.4 KiB
JSON
Raw Normal View History

Oracle 2022 October CPU On branch cna/Oracle/CPU2022Oct Changes to be committed: modified: 2022/21xxx/CVE-2022-21587.json modified: 2022/21xxx/CVE-2022-21589.json modified: 2022/21xxx/CVE-2022-21590.json modified: 2022/21xxx/CVE-2022-21591.json modified: 2022/21xxx/CVE-2022-21592.json modified: 2022/21xxx/CVE-2022-21593.json modified: 2022/21xxx/CVE-2022-21594.json modified: 2022/21xxx/CVE-2022-21595.json modified: 2022/21xxx/CVE-2022-21596.json modified: 2022/21xxx/CVE-2022-21597.json modified: 2022/21xxx/CVE-2022-21598.json modified: 2022/21xxx/CVE-2022-21599.json modified: 2022/21xxx/CVE-2022-21600.json modified: 2022/21xxx/CVE-2022-21601.json modified: 2022/21xxx/CVE-2022-21602.json modified: 2022/21xxx/CVE-2022-21603.json modified: 2022/21xxx/CVE-2022-21604.json modified: 2022/21xxx/CVE-2022-21605.json modified: 2022/21xxx/CVE-2022-21606.json modified: 2022/21xxx/CVE-2022-21607.json modified: 2022/21xxx/CVE-2022-21608.json modified: 2022/21xxx/CVE-2022-21609.json modified: 2022/21xxx/CVE-2022-21610.json modified: 2022/21xxx/CVE-2022-21611.json modified: 2022/21xxx/CVE-2022-21612.json modified: 2022/21xxx/CVE-2022-21613.json modified: 2022/21xxx/CVE-2022-21614.json modified: 2022/21xxx/CVE-2022-21615.json modified: 2022/21xxx/CVE-2022-21616.json modified: 2022/21xxx/CVE-2022-21617.json modified: 2022/21xxx/CVE-2022-21618.json modified: 2022/21xxx/CVE-2022-21619.json modified: 2022/21xxx/CVE-2022-21620.json modified: 2022/21xxx/CVE-2022-21621.json modified: 2022/21xxx/CVE-2022-21622.json modified: 2022/21xxx/CVE-2022-21623.json modified: 2022/21xxx/CVE-2022-21624.json modified: 2022/21xxx/CVE-2022-21625.json modified: 2022/21xxx/CVE-2022-21626.json modified: 2022/21xxx/CVE-2022-21627.json modified: 2022/21xxx/CVE-2022-21628.json modified: 2022/21xxx/CVE-2022-21629.json modified: 2022/21xxx/CVE-2022-21630.json modified: 2022/21xxx/CVE-2022-21631.json modified: 2022/21xxx/CVE-2022-21632.json modified: 2022/21xxx/CVE-2022-21633.json modified: 2022/21xxx/CVE-2022-21634.json modified: 2022/21xxx/CVE-2022-21635.json modified: 2022/21xxx/CVE-2022-21636.json modified: 2022/21xxx/CVE-2022-21637.json modified: 2022/21xxx/CVE-2022-21638.json modified: 2022/21xxx/CVE-2022-21639.json modified: 2022/21xxx/CVE-2022-21640.json modified: 2022/21xxx/CVE-2022-21641.json modified: 2022/39xxx/CVE-2022-39399.json modified: 2022/39xxx/CVE-2022-39400.json modified: 2022/39xxx/CVE-2022-39401.json modified: 2022/39xxx/CVE-2022-39402.json modified: 2022/39xxx/CVE-2022-39403.json modified: 2022/39xxx/CVE-2022-39404.json modified: 2022/39xxx/CVE-2022-39405.json modified: 2022/39xxx/CVE-2022-39406.json modified: 2022/39xxx/CVE-2022-39407.json modified: 2022/39xxx/CVE-2022-39408.json modified: 2022/39xxx/CVE-2022-39409.json modified: 2022/39xxx/CVE-2022-39410.json modified: 2022/39xxx/CVE-2022-39411.json modified: 2022/39xxx/CVE-2022-39412.json modified: 2022/39xxx/CVE-2022-39417.json modified: 2022/39xxx/CVE-2022-39419.json modified: 2022/39xxx/CVE-2022-39420.json modified: 2022/39xxx/CVE-2022-39421.json modified: 2022/39xxx/CVE-2022-39422.json modified: 2022/39xxx/CVE-2022-39423.json modified: 2022/39xxx/CVE-2022-39424.json modified: 2022/39xxx/CVE-2022-39425.json modified: 2022/39xxx/CVE-2022-39426.json modified: 2022/39xxx/CVE-2022-39427.json modified: 2022/39xxx/CVE-2022-39428.json
2022-10-18 13:48:11 -07:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2022-21601"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Communications Billing and Revenue Management",
"version": {
"version_data": [
{
"version_value": "12.0.0.4.0-12.0.0.7.0",
"version_affected": "="
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Connection Manager). Supported versions that are affected are 12.0.0.4.0-12.0.0.7.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Billing and Revenue Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.5",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Billing and Revenue Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Billing and Revenue Management."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2022.html"
}
]
}
}