mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00

Add impact field to CVE in Oracle 2020 January Critical Patch Updates On branch cna/Oracle/CPU2020JanCVSS Changes to be committed: modified: 2012/1xxx/CVE-2012-1695.json modified: 2019/2xxx/CVE-2019-2725.json modified: 2019/2xxx/CVE-2019-2729.json modified: 2019/2xxx/CVE-2019-2904.json modified: 2020/2xxx/CVE-2020-2510.json modified: 2020/2xxx/CVE-2020-2511.json modified: 2020/2xxx/CVE-2020-2512.json modified: 2020/2xxx/CVE-2020-2515.json modified: 2020/2xxx/CVE-2020-2516.json modified: 2020/2xxx/CVE-2020-2517.json modified: 2020/2xxx/CVE-2020-2518.json modified: 2020/2xxx/CVE-2020-2519.json modified: 2020/2xxx/CVE-2020-2527.json modified: 2020/2xxx/CVE-2020-2530.json modified: 2020/2xxx/CVE-2020-2531.json modified: 2020/2xxx/CVE-2020-2533.json modified: 2020/2xxx/CVE-2020-2534.json modified: 2020/2xxx/CVE-2020-2535.json modified: 2020/2xxx/CVE-2020-2536.json modified: 2020/2xxx/CVE-2020-2537.json modified: 2020/2xxx/CVE-2020-2538.json modified: 2020/2xxx/CVE-2020-2539.json modified: 2020/2xxx/CVE-2020-2540.json modified: 2020/2xxx/CVE-2020-2541.json modified: 2020/2xxx/CVE-2020-2542.json modified: 2020/2xxx/CVE-2020-2543.json modified: 2020/2xxx/CVE-2020-2544.json modified: 2020/2xxx/CVE-2020-2545.json modified: 2020/2xxx/CVE-2020-2546.json modified: 2020/2xxx/CVE-2020-2547.json modified: 2020/2xxx/CVE-2020-2548.json modified: 2020/2xxx/CVE-2020-2549.json modified: 2020/2xxx/CVE-2020-2550.json modified: 2020/2xxx/CVE-2020-2551.json modified: 2020/2xxx/CVE-2020-2552.json modified: 2020/2xxx/CVE-2020-2555.json modified: 2020/2xxx/CVE-2020-2556.json modified: 2020/2xxx/CVE-2020-2557.json modified: 2020/2xxx/CVE-2020-2558.json modified: 2020/2xxx/CVE-2020-2559.json modified: 2020/2xxx/CVE-2020-2560.json modified: 2020/2xxx/CVE-2020-2561.json modified: 2020/2xxx/CVE-2020-2563.json modified: 2020/2xxx/CVE-2020-2564.json modified: 2020/2xxx/CVE-2020-2565.json modified: 2020/2xxx/CVE-2020-2566.json modified: 2020/2xxx/CVE-2020-2567.json modified: 2020/2xxx/CVE-2020-2568.json modified: 2020/2xxx/CVE-2020-2569.json modified: 2020/2xxx/CVE-2020-2570.json modified: 2020/2xxx/CVE-2020-2571.json modified: 2020/2xxx/CVE-2020-2572.json modified: 2020/2xxx/CVE-2020-2573.json modified: 2020/2xxx/CVE-2020-2574.json modified: 2020/2xxx/CVE-2020-2576.json modified: 2020/2xxx/CVE-2020-2577.json modified: 2020/2xxx/CVE-2020-2578.json modified: 2020/2xxx/CVE-2020-2579.json modified: 2020/2xxx/CVE-2020-2580.json modified: 2020/2xxx/CVE-2020-2581.json modified: 2020/2xxx/CVE-2020-2582.json modified: 2020/2xxx/CVE-2020-2583.json modified: 2020/2xxx/CVE-2020-2584.json modified: 2020/2xxx/CVE-2020-2585.json modified: 2020/2xxx/CVE-2020-2586.json modified: 2020/2xxx/CVE-2020-2587.json modified: 2020/2xxx/CVE-2020-2588.json modified: 2020/2xxx/CVE-2020-2589.json modified: 2020/2xxx/CVE-2020-2590.json modified: 2020/2xxx/CVE-2020-2591.json modified: 2020/2xxx/CVE-2020-2592.json modified: 2020/2xxx/CVE-2020-2593.json modified: 2020/2xxx/CVE-2020-2595.json modified: 2020/2xxx/CVE-2020-2596.json modified: 2020/2xxx/CVE-2020-2597.json modified: 2020/2xxx/CVE-2020-2598.json modified: 2020/2xxx/CVE-2020-2599.json modified: 2020/2xxx/CVE-2020-2600.json modified: 2020/2xxx/CVE-2020-2601.json modified: 2020/2xxx/CVE-2020-2602.json modified: 2020/2xxx/CVE-2020-2603.json modified: 2020/2xxx/CVE-2020-2604.json modified: 2020/2xxx/CVE-2020-2605.json modified: 2020/2xxx/CVE-2020-2606.json modified: 2020/2xxx/CVE-2020-2607.json modified: 2020/2xxx/CVE-2020-2608.json modified: 2020/2xxx/CVE-2020-2609.json modified: 2020/2xxx/CVE-2020-2610.json modified: 2020/2xxx/CVE-2020-2611.json modified: 2020/2xxx/CVE-2020-2612.json modified: 2020/2xxx/CVE-2020-2613.json modified: 2020/2xxx/CVE-2020-2614.json modified: 2020/2xxx/CVE-2020-2615.json modified: 2020/2xxx/CVE-2020-2616.json modified: 2020/2xxx/CVE-2020-2617.json modified: 2020/2xxx/CVE-2020-2618.json modified: 2020/2xxx/CVE-2020-2619.json modified: 2020/2xxx/CVE-2020-2620.json modified: 2020/2xxx/CVE-2020-2621.json modified: 2020/2xxx/CVE-2020-2622.json modified: 2020/2xxx/CVE-2020-2623.json modified: 2020/2xxx/CVE-2020-2624.json modified: 2020/2xxx/CVE-2020-2625.json modified: 2020/2xxx/CVE-2020-2626.json modified: 2020/2xxx/CVE-2020-2627.json modified: 2020/2xxx/CVE-2020-2628.json modified: 2020/2xxx/CVE-2020-2629.json modified: 2020/2xxx/CVE-2020-2630.json modified: 2020/2xxx/CVE-2020-2631.json modified: 2020/2xxx/CVE-2020-2632.json modified: 2020/2xxx/CVE-2020-2633.json modified: 2020/2xxx/CVE-2020-2634.json modified: 2020/2xxx/CVE-2020-2635.json modified: 2020/2xxx/CVE-2020-2636.json modified: 2020/2xxx/CVE-2020-2637.json modified: 2020/2xxx/CVE-2020-2638.json modified: 2020/2xxx/CVE-2020-2639.json modified: 2020/2xxx/CVE-2020-2640.json modified: 2020/2xxx/CVE-2020-2641.json modified: 2020/2xxx/CVE-2020-2642.json modified: 2020/2xxx/CVE-2020-2643.json modified: 2020/2xxx/CVE-2020-2644.json modified: 2020/2xxx/CVE-2020-2645.json modified: 2020/2xxx/CVE-2020-2646.json modified: 2020/2xxx/CVE-2020-2647.json modified: 2020/2xxx/CVE-2020-2648.json modified: 2020/2xxx/CVE-2020-2649.json modified: 2020/2xxx/CVE-2020-2650.json modified: 2020/2xxx/CVE-2020-2651.json modified: 2020/2xxx/CVE-2020-2652.json modified: 2020/2xxx/CVE-2020-2653.json modified: 2020/2xxx/CVE-2020-2654.json modified: 2020/2xxx/CVE-2020-2655.json modified: 2020/2xxx/CVE-2020-2656.json modified: 2020/2xxx/CVE-2020-2657.json modified: 2020/2xxx/CVE-2020-2658.json modified: 2020/2xxx/CVE-2020-2659.json modified: 2020/2xxx/CVE-2020-2660.json modified: 2020/2xxx/CVE-2020-2661.json modified: 2020/2xxx/CVE-2020-2662.json modified: 2020/2xxx/CVE-2020-2663.json modified: 2020/2xxx/CVE-2020-2664.json modified: 2020/2xxx/CVE-2020-2665.json modified: 2020/2xxx/CVE-2020-2666.json modified: 2020/2xxx/CVE-2020-2667.json modified: 2020/2xxx/CVE-2020-2668.json modified: 2020/2xxx/CVE-2020-2669.json modified: 2020/2xxx/CVE-2020-2670.json modified: 2020/2xxx/CVE-2020-2671.json modified: 2020/2xxx/CVE-2020-2672.json modified: 2020/2xxx/CVE-2020-2673.json modified: 2020/2xxx/CVE-2020-2674.json modified: 2020/2xxx/CVE-2020-2675.json modified: 2020/2xxx/CVE-2020-2676.json modified: 2020/2xxx/CVE-2020-2677.json modified: 2020/2xxx/CVE-2020-2678.json modified: 2020/2xxx/CVE-2020-2679.json modified: 2020/2xxx/CVE-2020-2680.json modified: 2020/2xxx/CVE-2020-2681.json modified: 2020/2xxx/CVE-2020-2682.json modified: 2020/2xxx/CVE-2020-2683.json modified: 2020/2xxx/CVE-2020-2684.json modified: 2020/2xxx/CVE-2020-2685.json modified: 2020/2xxx/CVE-2020-2686.json modified: 2020/2xxx/CVE-2020-2687.json modified: 2020/2xxx/CVE-2020-2688.json modified: 2020/2xxx/CVE-2020-2689.json modified: 2020/2xxx/CVE-2020-2690.json modified: 2020/2xxx/CVE-2020-2691.json modified: 2020/2xxx/CVE-2020-2692.json modified: 2020/2xxx/CVE-2020-2693.json modified: 2020/2xxx/CVE-2020-2694.json modified: 2020/2xxx/CVE-2020-2695.json modified: 2020/2xxx/CVE-2020-2696.json modified: 2020/2xxx/CVE-2020-2697.json modified: 2020/2xxx/CVE-2020-2698.json modified: 2020/2xxx/CVE-2020-2699.json modified: 2020/2xxx/CVE-2020-2700.json modified: 2020/2xxx/CVE-2020-2701.json modified: 2020/2xxx/CVE-2020-2702.json modified: 2020/2xxx/CVE-2020-2703.json modified: 2020/2xxx/CVE-2020-2704.json modified: 2020/2xxx/CVE-2020-2705.json modified: 2020/2xxx/CVE-2020-2707.json modified: 2020/2xxx/CVE-2020-2709.json modified: 2020/2xxx/CVE-2020-2710.json modified: 2020/2xxx/CVE-2020-2711.json modified: 2020/2xxx/CVE-2020-2712.json modified: 2020/2xxx/CVE-2020-2713.json modified: 2020/2xxx/CVE-2020-2714.json modified: 2020/2xxx/CVE-2020-2715.json modified: 2020/2xxx/CVE-2020-2716.json modified: 2020/2xxx/CVE-2020-2717.json modified: 2020/2xxx/CVE-2020-2718.json modified: 2020/2xxx/CVE-2020-2719.json modified: 2020/2xxx/CVE-2020-2720.json modified: 2020/2xxx/CVE-2020-2721.json modified: 2020/2xxx/CVE-2020-2722.json modified: 2020/2xxx/CVE-2020-2723.json modified: 2020/2xxx/CVE-2020-2724.json modified: 2020/2xxx/CVE-2020-2725.json modified: 2020/2xxx/CVE-2020-2726.json modified: 2020/2xxx/CVE-2020-2727.json modified: 2020/2xxx/CVE-2020-2728.json modified: 2020/2xxx/CVE-2020-2729.json modified: 2020/2xxx/CVE-2020-2730.json modified: 2020/2xxx/CVE-2020-2731.json
83 lines
3.6 KiB
JSON
83 lines
3.6 KiB
JSON
|
|
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert_us@oracle.com",
|
|
"ID": "CVE-2020-2527",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Oracle Database",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "12.1.0.2",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "12.2.0.1",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "18c",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "19c",
|
|
"version_affected": "="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Oracle Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Index, Create Table privilege with network access via OracleNet to compromise Core RDBMS. While the vulnerability is in Core RDBMS, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Core RDBMS accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N)."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"baseScore": "4.1",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
|
|
"version": "3.0"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Easily exploitable vulnerability allows high privileged attacker having Create Index, Create Table privilege with network access via OracleNet to compromise Core RDBMS. While the vulnerability is in Core RDBMS, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Core RDBMS accessible data."
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
|
}
|
|
]
|
|
}
|
|
} |