{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T01:13:09.815","vulnerabilities":[{"cve":{"id":"CVE-2022-21558","sourceIdentifier":"secalert_us@oracle.com","published":"2022-07-19T22:15:12.627","lastModified":"2024-11-21T06:44:57.273","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Crystal Ball product of Oracle Construction and Engineering (component: Installation). Supported versions that are affected are 11.1.2.0.000-11.1.2.4.900. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Crystal Ball executes to compromise Oracle Crystal Ball. While the vulnerability is in Oracle Crystal Ball, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Crystal Ball. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)."},{"lang":"es","value":"Una vulnerabilidad en el producto Oracle Crystal Ball de Oracle Construction and Engineering (componente: Installation). Las versiones afectadas son 11.1.2.0.000-11.1.2.4.900. Una vulnerabilidad difícil de explotar permite a un atacante poco privilegiado que inicie sesión en la infraestructura donde es ejecutado Oracle Crystal Ball comprometerlo. Aunque la vulnerabilidad está en Oracle Crystal Ball, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques con éxito de esta vulnerabilidad pueden resultar en la toma de control de Oracle Crystal Ball. CVSS 3.1, Puntuación Base 7.8 (impactos en la Confidencialidad, Integridad y Disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.1,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.1,"impactScore":6.0}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:crystal_ball:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.2.0.000","versionEndIncluding":"11.1.2.4.900","matchCriteriaId":"D83C9479-F19A-4985-BBB8-5B3044797C41"}]}]}],"references":[{"url":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0031/MNDT-2022-0031.md","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0031/MNDT-2022-0031.md","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}