cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-2981,https://securityvulnerability.io/vulnerability/CVE-2020-2981,Vulnerability in Data Store Component of Oracle Berkeley DB,"A vulnerability exists in the Data Store component of Oracle Berkeley DB, which affects versions prior to 18.1.40. This vulnerability can be exploited by an unauthenticated attacker who has access to the infrastructure where the Data Store operates. Exploitation requires human interaction from an individual other than the attacker, potentially leading to a compromise of the Data Store. If successfully exploited, the attacker could gain control over the Data Store, posing risks to the confidentiality, integrity, and availability of the involved data.",Oracle,Oracle Berkeley Db,7,HIGH,0.0007399999885819852,false,,false,false,false,,,false,false,,2020-07-15T17:34:36.000Z,0 CVE-2019-2868,https://securityvulnerability.io/vulnerability/CVE-2019-2868,Data Store Vulnerability in Oracle Berkeley DB,"The vulnerability in the Data Store component of Oracle Berkeley DB allows unauthenticated attackers who have access to the infrastructure where the Data Store operates to compromise its functionality. Although difficult to exploit without human interaction from another user, successful exploitations can lead to a complete takeover of the Data Store, risking confidentiality, integrity, and availability of the stored data. Organizations using affected versions need to take precautions to safeguard their systems.",Oracle,Oracle Berkeley Db,7,HIGH,0.0007399999885819852,false,,false,false,false,,,false,false,,2019-07-23T23:15:00.000Z,0 CVE-2019-2870,https://securityvulnerability.io/vulnerability/CVE-2019-2870,Vulnerability in Oracle Berkeley DB Data Store Component,"This security flaw in the Data Store component of Oracle Berkeley DB permits an unauthenticated attacker with access to the execution infrastructure to exploit the vulnerability. Successful exploitation requires interaction from someone other than the attacker, making it challenging to execute. When successfully attacked, the Data Store can be compromised, leading to significant impacts on the confidentiality, integrity, and availability of the stored data, hence underscoring the importance of timely patching and mitigation.",Oracle,Oracle Berkeley Db,7,HIGH,0.0007399999885819852,false,,false,false,false,,,false,false,,2019-07-23T23:15:00.000Z,0 CVE-2019-2869,https://securityvulnerability.io/vulnerability/CVE-2019-2869,Data Store Vulnerability in Oracle Berkeley DB from Oracle,"A vulnerability exists in the Data Store component of Oracle Berkeley DB, allowing an unauthenticated attacker with access to the execution environment to compromise the Data Store. Successful exploitation of this vulnerability necessitates human interaction from a user other than the attacker, which means that while the mechanism to exploit it is complex, it can ultimately lead to control over the Data Store. Affected versions include several within the 12.1.6.x range, highlighting the need for prompt security measures to safeguard data integrity, confidentiality, and availability.",Oracle,Oracle Berkeley Db,7,HIGH,0.0007399999885819852,false,,false,false,false,,,false,false,,2019-07-23T23:15:00.000Z,0 CVE-2019-2760,https://securityvulnerability.io/vulnerability/CVE-2019-2760,Vulnerability in Data Store Component of Oracle Berkeley DB,"A vulnerability exists within the Data Store component of Oracle Berkeley DB, allowing unauthorized access to the system by an unauthenticated attacker. This flaw can be exploited if the attacker can gain access to the infrastructure where Data Store operates, and it requires human interaction from a third party to trigger a successful attack. If exploited, this vulnerability could enable an attacker to take complete control over the Data Store, posing significant risks to data confidentiality, integrity, and availability.",Oracle,Oracle Berkeley Db,7,HIGH,0.0007399999885819852,false,,false,false,false,,,false,false,,2019-07-23T23:15:00.000Z,0 CVE-2019-2871,https://securityvulnerability.io/vulnerability/CVE-2019-2871,Security Vulnerability in Oracle Berkeley DB Data Store Component,"A vulnerability exists within the Data Store component of Oracle Berkeley DB that may allow an unauthenticated attacker to exploit the system if they have access to the logon infrastructure where Data Store operates. While the attack requires human interaction by someone other than the attacker, it can ultimately lead to the compromise of Data Store functionality. Affected versions include multiple releases, each presenting various risks to data confidentiality, integrity, and availability.",Oracle,Oracle Berkeley Db,7,HIGH,0.0007399999885819852,false,,false,false,false,,,false,false,,2019-07-23T23:15:00.000Z,0 CVE-2019-2708,https://securityvulnerability.io/vulnerability/CVE-2019-2708,Vulnerability in Data Store Component of Oracle Berkeley DB,"The vulnerability affects the Data Store component of Oracle Berkeley DB, allowing a low privileged attacker with local logon access to compromise the data store. This can lead to unauthorized actions that may cause a partial denial of service, affecting the availability of the Data Store operation. It's crucial for users of affected versions to apply the necessary updates to mitigate this security issue.",Oracle,Oracle Berkeley Db,3.3,LOW,0.000910000002477318,false,,false,false,false,,,false,false,,2019-04-23T18:16:45.000Z,0 CVE-2017-3606,https://securityvulnerability.io/vulnerability/CVE-2017-3606,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3614,https://securityvulnerability.io/vulnerability/CVE-2017-3614,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3612,https://securityvulnerability.io/vulnerability/CVE-2017-3612,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3605,https://securityvulnerability.io/vulnerability/CVE-2017-3605,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3611,https://securityvulnerability.io/vulnerability/CVE-2017-3611,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3616,https://securityvulnerability.io/vulnerability/CVE-2017-3616,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3617,https://securityvulnerability.io/vulnerability/CVE-2017-3617,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3604,https://securityvulnerability.io/vulnerability/CVE-2017-3604,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3610,https://securityvulnerability.io/vulnerability/CVE-2017-3610,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3609,https://securityvulnerability.io/vulnerability/CVE-2017-3609,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3615,https://securityvulnerability.io/vulnerability/CVE-2017-3615,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3607,https://securityvulnerability.io/vulnerability/CVE-2017-3607,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3613,https://securityvulnerability.io/vulnerability/CVE-2017-3613,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2017-3608,https://securityvulnerability.io/vulnerability/CVE-2017-3608,,"Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",Oracle,Oracle Berkeley Db,7,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-04-24T19:00:00.000Z,0 CVE-2016-0692,https://securityvulnerability.io/vulnerability/CVE-2016-0692,,"Unspecified vulnerability in the DataStore component in Oracle Berkeley DB 11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, and 12.1.6.1.26 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2016-0682, CVE-2016-0689, CVE-2016-0694, and CVE-2016-3418.",Oracle,Berkeley Db,7.8,HIGH,0.0012100000167265534,false,,false,false,false,,,false,false,,2016-04-21T10:00:00.000Z,0 CVE-2016-0694,https://securityvulnerability.io/vulnerability/CVE-2016-0694,,"Unspecified vulnerability in the DataStore component in Oracle Berkeley DB 11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, and 12.1.6.1.26 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2016-0682, CVE-2016-0689, CVE-2016-0692, and CVE-2016-3418.",Oracle,Berkeley Db,7.8,HIGH,0.0012100000167265534,false,,false,false,false,,,false,false,,2016-04-21T10:00:00.000Z,0 CVE-2016-0682,https://securityvulnerability.io/vulnerability/CVE-2016-0682,,"Unspecified vulnerability in the DataStore component in Oracle Berkeley DB 11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, and 12.1.6.1.26 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2016-0689, CVE-2016-0692, CVE-2016-0694, and CVE-2016-3418.",Oracle,Berkeley Db,7.8,HIGH,0.0012100000167265534,false,,false,false,false,,,false,false,,2016-04-21T10:00:00.000Z,0 CVE-2016-0689,https://securityvulnerability.io/vulnerability/CVE-2016-0689,,"Unspecified vulnerability in the DataStore component in Oracle Berkeley DB 11.2.5.0.32, 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, 12.1.6.0.35, and 12.1.6.1.26 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2016-0682, CVE-2016-0692, CVE-2016-0694, and CVE-2016-3418.",Oracle,Berkeley Db,7.8,HIGH,0.0012100000167265534,false,,false,false,false,,,false,false,,2016-04-21T10:00:00.000Z,0