{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T14:56:30.472","vulnerabilities":[{"cve":{"id":"CVE-2025-21554","sourceIdentifier":"secalert_us@oracle.com","published":"2025-01-21T21:15:22.020","lastModified":"2025-06-20T16:58:12.950","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security).  Supported versions that are affected are 7.4.0, 7.4.1 and  7.5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Order and Service Management.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."},{"lang":"es","value":"Vulnerabilidad en el producto Oracle Communications Order and Service Management de Oracle Communications Applications (componente: Seguridad). Las versiones compatibles afectadas son 7.4.0, 7.4.1 y 7.5.0. Esta vulnerabilidad, que se puede explotar fácilmente, permite que un atacante no autenticado con acceso a la red a través de HTTP ponga en peligro Oracle Communications Order and Service Management. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Communications Order and Service Management. Puntuación base de CVSS 3.1: 5,3 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*","matchCriteriaId":"FD876393-080D-4C24-B28D-EF1AE476EDD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*","matchCriteriaId":"6DD496A6-ED56-4356-B1ED-FC9D7F88A7B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*","matchCriteriaId":"87BB9F82-BB5D-4814-AF34-E4AB4C69A23A"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpujan2025.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]}]}}]}