cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-22083,https://securityvulnerability.io/vulnerability/CVE-2023-22083,Vulnerability in Oracle Enterprise Session Border Controller Web UI,"A vulnerability has been identified in the Oracle Enterprise Session Border Controller's Web UI, present in versions 9.0 to 9.2. An unauthenticated attacker with network access via HTTPS can exploit this flaw. For a successful attack, human interaction is required from a user other than the attacker. This can lead to unauthorized read access to certain data within the Oracle Enterprise Session Border Controller. Organizations using the affected versions should implement necessary security measures to mitigate potential risks.",Oracle,"Enterprise Communications Broker,Enterprise Session Border Controller",4.3,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2023-10-17T22:15:00.000Z,0 CVE-2021-2416,https://securityvulnerability.io/vulnerability/CVE-2021-2416,Routing Vulnerability in Oracle Communications Session Border Controller,"A vulnerability exists in Oracle Communications Session Border Controller that allows a high-privileged attacker with network access via HTTP to compromise the system. This flaw could enable unauthorized users to cause system hangs or frequent crashes, leading to denial of service to legitimate users. The affected versions are 8.4 and 9.0, and it is critical for organizations to monitor and remediate to prevent exploitation.",Oracle,Communications Session Border Controller,4.9,MEDIUM,0.000590000010561198,false,,false,false,false,,,false,false,,2021-10-20T10:49:36.000Z,0 CVE-2021-2414,https://securityvulnerability.io/vulnerability/CVE-2021-2414,Vulnerability in Oracle Communications Session Border Controller Routing Component,"This vulnerability in Oracle Communications Session Border Controller's routing component allows a high-privileged attacker with network access via HTTP to compromise the system. Affected versions 8.4 and 9.0 are susceptible to exploitation, potentially leading to unauthorized access to sensitive data or complete control over all accessible data. This poses a significant risk not only to the Session Border Controller itself but also to other interconnected products, as successful attacks could facilitate broader security breaches.",Oracle,Communications Session Border Controller,6.8,MEDIUM,0.0009399999980814755,false,,false,false,false,,,false,false,,2021-10-20T10:49:35.000Z,0 CVE-2020-14580,https://securityvulnerability.io/vulnerability/CVE-2020-14580,Vulnerability in Oracle Communications Session Border Controller by Oracle,"A vulnerability in Oracle Communications Session Border Controller allows low-privileged attackers with SSH network access to compromise the system. This exploitation requires human interaction from an individual other than the attacker. While primarily affecting the Oracle Communications Session Border Controller, successful attacks can have a far-reaching impact on interconnected systems, possibly leading to unauthorized access, data manipulation, and a partial denial of service. It is essential for organizations using affected versions (8.1.0, 8.2.0, and 8.3.0) to apply necessary security patches to mitigate these risks.",Oracle,Communications Session Border Controller,8.2,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2020-07-15T17:34:28.000Z,0