{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T12:19:31.177","vulnerabilities":[{"cve":{"id":"CVE-2022-21555","sourceIdentifier":"secalert_us@oracle.com","published":"2022-07-19T22:15:12.463","lastModified":"2024-11-21T06:44:56.893","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the MySQL Shell for VS Code product of Oracle MySQL (component: Shell: GUI). Supported versions that are affected are 1.1.8 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Shell for VS Code executes to compromise MySQL Shell for VS Code. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Shell for VS Code, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Shell for VS Code accessible data as well as unauthorized read access to a subset of MySQL Shell for VS Code accessible data. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N)."},{"lang":"es","value":"Una vulnerabilidad en el producto MySQL Shell for VS Code de Oracle MySQL (componente: Shell: GUI). Las versiones compatibles que están afectadas son 1.1.8 y anteriores. Una vulnerabilidad explotable fácilmente permite a un atacante muy privilegiado y con acceso a la infraestructura donde es ejecutado MySQL Shell for VS Code comprometer MySQL Shell for VS Code. Los ataques con éxito requieren una interacción humana de una persona diferente del atacante y mientras la vulnerabilidad está en MySQL Shell para VS Code, los ataques pueden impactar significativamente en productos adicionales (cambio de alcance). Los ataques con éxito de esta vulnerabilidad pueden resultar en el acceso no autorizado de actualización, inserción o eliminación de algunos de los datos accesibles de MySQL Shell para VS Code, así como el acceso no autorizado de lectura a un subconjunto de datos accesibles de MySQL Shell para VS Code. CVSS 3.1, Puntuación Base 4.2 (impactos en la Confidencialidad y la Integridad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.1,"impactScore":2.7}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql_shell:*:*:*:*:*:visual_studio_code:*:*","versionEndIncluding":"1.1.8","matchCriteriaId":"38BF6087-B921-44FB-A3F9-B49911A874E4"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}