{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T00:02:35.758","vulnerabilities":[{"cve":{"id":"CVE-2025-21551","sourceIdentifier":"secalert_us@oracle.com","published":"2025-01-21T21:15:21.637","lastModified":"2025-05-07T20:04:11.897","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Solaris product of Oracle Systems (component: File system).   The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.0 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:H\/A:H)."},{"lang":"es","value":"Vulnerabilidad en el producto Oracle Solaris de Oracle Systems (componente: Archivo sistema). La versión compatible afectada es la 11. Esta vulnerabilidad, que se puede explotar fácilmente, permite que un atacante con privilegios elevados y que inicie sesión en la infraestructura donde se ejecuta Oracle Solaris comprometa Oracle Solaris. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la creación, eliminación o modificación no autorizada de datos críticos o de todos los datos accesibles de Oracle Solaris y la capacidad no autorizada de provocar un bloqueo o una falla repetitiva frecuente (DOS completa) de Oracle Solaris. Puntuación base de CVSS 3.1: 6,0 (impactos en la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:H\/A:H)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:H\/A:H","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*","matchCriteriaId":"8E8C192B-8044-4BF9-9F1F-57371FC0E8FD"}]}]}],"references":[{"url":"https:\/\/www.oracle.com\/security-alerts\/cpujan2025.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]}]}}]}