mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00

On branch cna/Oracle/CPU2022Oct Changes to be committed: modified: 2022/21xxx/CVE-2022-21587.json modified: 2022/21xxx/CVE-2022-21589.json modified: 2022/21xxx/CVE-2022-21590.json modified: 2022/21xxx/CVE-2022-21591.json modified: 2022/21xxx/CVE-2022-21592.json modified: 2022/21xxx/CVE-2022-21593.json modified: 2022/21xxx/CVE-2022-21594.json modified: 2022/21xxx/CVE-2022-21595.json modified: 2022/21xxx/CVE-2022-21596.json modified: 2022/21xxx/CVE-2022-21597.json modified: 2022/21xxx/CVE-2022-21598.json modified: 2022/21xxx/CVE-2022-21599.json modified: 2022/21xxx/CVE-2022-21600.json modified: 2022/21xxx/CVE-2022-21601.json modified: 2022/21xxx/CVE-2022-21602.json modified: 2022/21xxx/CVE-2022-21603.json modified: 2022/21xxx/CVE-2022-21604.json modified: 2022/21xxx/CVE-2022-21605.json modified: 2022/21xxx/CVE-2022-21606.json modified: 2022/21xxx/CVE-2022-21607.json modified: 2022/21xxx/CVE-2022-21608.json modified: 2022/21xxx/CVE-2022-21609.json modified: 2022/21xxx/CVE-2022-21610.json modified: 2022/21xxx/CVE-2022-21611.json modified: 2022/21xxx/CVE-2022-21612.json modified: 2022/21xxx/CVE-2022-21613.json modified: 2022/21xxx/CVE-2022-21614.json modified: 2022/21xxx/CVE-2022-21615.json modified: 2022/21xxx/CVE-2022-21616.json modified: 2022/21xxx/CVE-2022-21617.json modified: 2022/21xxx/CVE-2022-21618.json modified: 2022/21xxx/CVE-2022-21619.json modified: 2022/21xxx/CVE-2022-21620.json modified: 2022/21xxx/CVE-2022-21621.json modified: 2022/21xxx/CVE-2022-21622.json modified: 2022/21xxx/CVE-2022-21623.json modified: 2022/21xxx/CVE-2022-21624.json modified: 2022/21xxx/CVE-2022-21625.json modified: 2022/21xxx/CVE-2022-21626.json modified: 2022/21xxx/CVE-2022-21627.json modified: 2022/21xxx/CVE-2022-21628.json modified: 2022/21xxx/CVE-2022-21629.json modified: 2022/21xxx/CVE-2022-21630.json modified: 2022/21xxx/CVE-2022-21631.json modified: 2022/21xxx/CVE-2022-21632.json modified: 2022/21xxx/CVE-2022-21633.json modified: 2022/21xxx/CVE-2022-21634.json modified: 2022/21xxx/CVE-2022-21635.json modified: 2022/21xxx/CVE-2022-21636.json modified: 2022/21xxx/CVE-2022-21637.json modified: 2022/21xxx/CVE-2022-21638.json modified: 2022/21xxx/CVE-2022-21639.json modified: 2022/21xxx/CVE-2022-21640.json modified: 2022/21xxx/CVE-2022-21641.json modified: 2022/39xxx/CVE-2022-39399.json modified: 2022/39xxx/CVE-2022-39400.json modified: 2022/39xxx/CVE-2022-39401.json modified: 2022/39xxx/CVE-2022-39402.json modified: 2022/39xxx/CVE-2022-39403.json modified: 2022/39xxx/CVE-2022-39404.json modified: 2022/39xxx/CVE-2022-39405.json modified: 2022/39xxx/CVE-2022-39406.json modified: 2022/39xxx/CVE-2022-39407.json modified: 2022/39xxx/CVE-2022-39408.json modified: 2022/39xxx/CVE-2022-39409.json modified: 2022/39xxx/CVE-2022-39410.json modified: 2022/39xxx/CVE-2022-39411.json modified: 2022/39xxx/CVE-2022-39412.json modified: 2022/39xxx/CVE-2022-39417.json modified: 2022/39xxx/CVE-2022-39419.json modified: 2022/39xxx/CVE-2022-39420.json modified: 2022/39xxx/CVE-2022-39421.json modified: 2022/39xxx/CVE-2022-39422.json modified: 2022/39xxx/CVE-2022-39423.json modified: 2022/39xxx/CVE-2022-39424.json modified: 2022/39xxx/CVE-2022-39425.json modified: 2022/39xxx/CVE-2022-39426.json modified: 2022/39xxx/CVE-2022-39427.json modified: 2022/39xxx/CVE-2022-39428.json
72 lines
3.1 KiB
JSON
72 lines
3.1 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert_us@oracle.com",
|
|
"ID": "CVE-2022-21603"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Database - Enterprise Edition",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "19c",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "21c",
|
|
"version_affected": "="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Oracle Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Vulnerability in the Oracle Database - Sharding component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Local Logon to compromise Oracle Database - Sharding. Successful attacks of this vulnerability can result in takeover of Oracle Database - Sharding. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"baseScore": "7.2",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Local Logon to compromise Oracle Database - Sharding. Successful attacks of this vulnerability can result in takeover of Oracle Database - Sharding."
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpuoct2022.html"
|
|
}
|
|
]
|
|
}
|
|
}
|