{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T11:26:48.720","vulnerabilities":[{"cve":{"id":"CVE-2022-39403","sourceIdentifier":"secalert_us@oracle.com","published":"2022-10-18T21:15:14.947","lastModified":"2024-11-21T07:18:13.343","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Shell accessible data as well as unauthorized read access to a subset of MySQL Shell accessible data. CVSS 3.1 Base Score 3.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)."},{"lang":"es","value":"Una vulnerabilidad en el producto MySQL Shell de Oracle MySQL (componente: Shell: Core Client). Las versiones soportadas que están afectadas son 8.0.30 y anteriores. Una vulnerabilidad explotable fácilmente permite a un atacante poco privilegiado y con acceso a la infraestructura donde es ejecutado MySQL Shell, comprometer MySQL Shell. Los ataques con éxito requieren una interacción humana de una persona que no sea el atacante. Los ataques con éxito de esta vulnerabilidad pueden resultar en la actualización no autorizada, la inserción o el acceso a la eliminación de algunos de los datos accesibles de MySQL Shell, así como el acceso de lectura no autorizado a un subconjunto de datos accesibles de MySQL Shell. CVSS 3.1 Puntuación Base 3.9 (Impactos en la Confidencialidad y la Integridad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)"}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":3.9,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.3,"impactScore":2.5}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0","versionEndIncluding":"8.0.30","matchCriteriaId":"58EBF1CC-09E9-47E4-B78B-85C8E6DCDAC0"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpuoct2022.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}