{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T23:12:49.596","vulnerabilities":[{"cve":{"id":"CVE-2026-21942","sourceIdentifier":"secalert_us@oracle.com","published":"2026-01-20T22:15:57.027","lastModified":"2026-01-29T20:35:17.903","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystems).  Supported versions that are affected are 10 and  11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.0 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)."},{"lang":"es","value":"Vulnerabilidad en el producto Oracle Solaris de Oracle Systems (componente: Sistemas de Archivos). Las versiones compatibles que están afectadas son 10 y 11. La vulnerabilidad fácilmente explotable permite a un atacante con bajos privilegios con inicio de sesión en la infraestructura donde se ejecuta Oracle Solaris comprometer Oracle Solaris. Los ataques exitosos requieren interacción humana de una persona que no sea el atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en la capacidad no autorizada de causar un bloqueo o una caída (crash) frecuentemente repetible (DoS completo) de Oracle Solaris. Puntuación base CVSS 3.1 de 5.0 (Impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","baseScore":5.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","matchCriteriaId":"964B57CD-CB8A-4520-B358-1C93EC5EF2DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*","matchCriteriaId":"8E8C192B-8044-4BF9-9F1F-57371FC0E8FD"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpujan2026.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]}]}}]}