{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T17:26:50.703","vulnerabilities":[{"cve":{"id":"CVE-2018-2875","sourceIdentifier":"secalert_us@oracle.com","published":"2019-10-16T18:15:19.967","lastModified":"2024-11-21T04:04:40.090","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via OracleNet to compromise Core RDBMS. While the vulnerability is in Core RDBMS, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Core RDBMS accessible data. CVSS 3.0 Base Score 5.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0\/AV:N\/AC:L\/PR:L\/UI:N\/S:C\/C:L\/I:N\/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente Core RDBMS de Oracle Database Server. Las versiones compatibles que se ven afectadas son 12.2.0.1, 18c y 19c. Una vulnerabilidad fácilmente explotable permite a un atacante poco privilegiado tener el privilegio de Crear Sesión con acceso a la red por medio de OracleNet para comprometer el Core RDBMS. Aunque la vulnerabilidad se encuentra en Core RDBMS, los ataques pueden afectar significativamente a productos adicionales. Los ataques con éxito de esta vulnerabilidad pueden resultar en acceso de lectura no autorizado a un subconjunto de datos accesibles Core RDBMS. CVSS 3.0 Puntuación Base 5.0 (Impactos de confidencialidad). Vector CVSS: (CVSS:3.0\/AV:N\/AC:L\/PR:L\/UI:N\/S:C\/C:L\/I:N\/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:C\/C:L\/I:N\/A:N","baseScore":5.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:L\/Au:S\/C:P\/I:N\/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"5C614BA7-7103-4ED7-ADD0-56064FE256A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*","matchCriteriaId":"6833701E-5510-4180-9523-9CFD318DEE6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:19c:*:*:*:*:*:*:*","matchCriteriaId":"B2204841-585F-40C7-A1D9-C34E612808CA"}]}]}],"references":[{"url":"http:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2019-5072832.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"http:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2019-5072832.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}