{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T22:54:28.417","vulnerabilities":[{"cve":{"id":"CVE-2025-50069","sourceIdentifier":"secalert_us@oracle.com","published":"2025-07-15T20:15:42.533","lastModified":"2025-08-04T21:17:39.993","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Java VM component of Oracle Database Server.  Supported versions that are affected are 19.3-19.27 and  21.3-21.18. Easily exploitable vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM.  While the vulnerability is in Java VM, attacks may significantly impact additional products (scope change).  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 7.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente Java VM de Oracle Database Server. Las versiones compatibles afectadas son 19.3-19.27 y 21.3-21.18. Esta vulnerabilidad, fácilmente explotable, permite a un atacante con privilegios bajos, con privilegios para crear sesión y procedimiento y acceso a la red a través de Oracle Net, comprometer Java VM. Si bien la vulnerabilidad afecta a Java VM, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos a esta vulnerabilidad pueden resultar en acceso no autorizado a datos críticos o acceso completo a todos los datos accesibles de Java VM. Puntuación base de CVSS 3.1: 7.7 (Afecta a la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":4.0}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*","versionStartIncluding":"19.3","versionEndIncluding":"19.27","matchCriteriaId":"CD0B1156-1CE9-4660-9706-C3C077205874"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*","versionStartIncluding":"21.3","versionEndIncluding":"21.18","matchCriteriaId":"8919E306-A3B4-4156-B340-FC2E7813727C"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpujul2025.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]}]}}]}