cvelist/2022/21xxx/CVE-2022-21603.json
Bill Situ 910161da99 Oracle 2022 October CPU
On branch cna/Oracle/CPU2022Oct
 Changes to be committed:
	modified:   2022/21xxx/CVE-2022-21587.json
	modified:   2022/21xxx/CVE-2022-21589.json
	modified:   2022/21xxx/CVE-2022-21590.json
	modified:   2022/21xxx/CVE-2022-21591.json
	modified:   2022/21xxx/CVE-2022-21592.json
	modified:   2022/21xxx/CVE-2022-21593.json
	modified:   2022/21xxx/CVE-2022-21594.json
	modified:   2022/21xxx/CVE-2022-21595.json
	modified:   2022/21xxx/CVE-2022-21596.json
	modified:   2022/21xxx/CVE-2022-21597.json
	modified:   2022/21xxx/CVE-2022-21598.json
	modified:   2022/21xxx/CVE-2022-21599.json
	modified:   2022/21xxx/CVE-2022-21600.json
	modified:   2022/21xxx/CVE-2022-21601.json
	modified:   2022/21xxx/CVE-2022-21602.json
	modified:   2022/21xxx/CVE-2022-21603.json
	modified:   2022/21xxx/CVE-2022-21604.json
	modified:   2022/21xxx/CVE-2022-21605.json
	modified:   2022/21xxx/CVE-2022-21606.json
	modified:   2022/21xxx/CVE-2022-21607.json
	modified:   2022/21xxx/CVE-2022-21608.json
	modified:   2022/21xxx/CVE-2022-21609.json
	modified:   2022/21xxx/CVE-2022-21610.json
	modified:   2022/21xxx/CVE-2022-21611.json
	modified:   2022/21xxx/CVE-2022-21612.json
	modified:   2022/21xxx/CVE-2022-21613.json
	modified:   2022/21xxx/CVE-2022-21614.json
	modified:   2022/21xxx/CVE-2022-21615.json
	modified:   2022/21xxx/CVE-2022-21616.json
	modified:   2022/21xxx/CVE-2022-21617.json
	modified:   2022/21xxx/CVE-2022-21618.json
	modified:   2022/21xxx/CVE-2022-21619.json
	modified:   2022/21xxx/CVE-2022-21620.json
	modified:   2022/21xxx/CVE-2022-21621.json
	modified:   2022/21xxx/CVE-2022-21622.json
	modified:   2022/21xxx/CVE-2022-21623.json
	modified:   2022/21xxx/CVE-2022-21624.json
	modified:   2022/21xxx/CVE-2022-21625.json
	modified:   2022/21xxx/CVE-2022-21626.json
	modified:   2022/21xxx/CVE-2022-21627.json
	modified:   2022/21xxx/CVE-2022-21628.json
	modified:   2022/21xxx/CVE-2022-21629.json
	modified:   2022/21xxx/CVE-2022-21630.json
	modified:   2022/21xxx/CVE-2022-21631.json
	modified:   2022/21xxx/CVE-2022-21632.json
	modified:   2022/21xxx/CVE-2022-21633.json
	modified:   2022/21xxx/CVE-2022-21634.json
	modified:   2022/21xxx/CVE-2022-21635.json
	modified:   2022/21xxx/CVE-2022-21636.json
	modified:   2022/21xxx/CVE-2022-21637.json
	modified:   2022/21xxx/CVE-2022-21638.json
	modified:   2022/21xxx/CVE-2022-21639.json
	modified:   2022/21xxx/CVE-2022-21640.json
	modified:   2022/21xxx/CVE-2022-21641.json
	modified:   2022/39xxx/CVE-2022-39399.json
	modified:   2022/39xxx/CVE-2022-39400.json
	modified:   2022/39xxx/CVE-2022-39401.json
	modified:   2022/39xxx/CVE-2022-39402.json
	modified:   2022/39xxx/CVE-2022-39403.json
	modified:   2022/39xxx/CVE-2022-39404.json
	modified:   2022/39xxx/CVE-2022-39405.json
	modified:   2022/39xxx/CVE-2022-39406.json
	modified:   2022/39xxx/CVE-2022-39407.json
	modified:   2022/39xxx/CVE-2022-39408.json
	modified:   2022/39xxx/CVE-2022-39409.json
	modified:   2022/39xxx/CVE-2022-39410.json
	modified:   2022/39xxx/CVE-2022-39411.json
	modified:   2022/39xxx/CVE-2022-39412.json
	modified:   2022/39xxx/CVE-2022-39417.json
	modified:   2022/39xxx/CVE-2022-39419.json
	modified:   2022/39xxx/CVE-2022-39420.json
	modified:   2022/39xxx/CVE-2022-39421.json
	modified:   2022/39xxx/CVE-2022-39422.json
	modified:   2022/39xxx/CVE-2022-39423.json
	modified:   2022/39xxx/CVE-2022-39424.json
	modified:   2022/39xxx/CVE-2022-39425.json
	modified:   2022/39xxx/CVE-2022-39426.json
	modified:   2022/39xxx/CVE-2022-39427.json
	modified:   2022/39xxx/CVE-2022-39428.json
2022-10-18 13:48:11 -07:00

72 lines
3.1 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2022-21603"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Database - Enterprise Edition",
"version": {
"version_data": [
{
"version_value": "19c",
"version_affected": "="
},
{
"version_value": "21c",
"version_affected": "="
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the Oracle Database - Sharding component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Local Logon to compromise Oracle Database - Sharding. Successful attacks of this vulnerability can result in takeover of Oracle Database - Sharding. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."
}
]
},
"impact": {
"cvss": {
"baseScore": "7.2",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Local Logon to compromise Oracle Database - Sharding. Successful attacks of this vulnerability can result in takeover of Oracle Database - Sharding."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2022.html"
}
]
}
}