cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-2445,https://securityvulnerability.io/vulnerability/CVE-2021-2445,Unauthorized Access Flaw in Oracle Hyperion Lifecycle Management,"A vulnerability in Oracle Hyperion's Lifecycle Management component could allow an attacker with network access to compromise the system. This issue requires user interaction from a third party, making it challenging to exploit. Once successfully executed, it could lead to unauthorized modifications to crucial data or the ability to delete data within Hyperion Infrastructure Technology, impacting data confidentiality and integrity.",Oracle,Hyperion Infrastructure Technology,5.7,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2021-07-20T22:44:53.000Z,0 CVE-2021-2347,https://securityvulnerability.io/vulnerability/CVE-2021-2347,High Privilege Vulnerability in Oracle Hyperion Infrastructure Technology Lifecycle Management,"A vulnerability has been identified in Oracle's Hyperion Infrastructure Technology, specifically within the Lifecycle Management component. This security flaw allows a highly privileged attacker with network access via HTTP to exploit the system. While successful attacks require the interaction of an unsuspecting user, they can lead to unauthorized access to critical information and comprehensive access to all data accessible through Hyperion Infrastructure Technology. Additionally, this flaw permits unauthorized operations such as update, insert, or deletion of some critical data, exposing the organization to significant risks.",Oracle,Hyperion Infrastructure Technology,5.2,MEDIUM,0.0006699999794363976,false,,false,false,false,,,false,false,,2021-07-20T22:43:25.000Z,0 CVE-2020-14854,https://securityvulnerability.io/vulnerability/CVE-2020-14854,Unauthorized Data Access in Oracle Hyperion Infrastructure Technology,"A serious access control vulnerability exists in Oracle's Hyperion Infrastructure Technology, specifically within the UI and Visualization component. This flaw enables a high-privileged attacker with network access via HTTP to potentially compromise the application. Successful exploitation requires some degree of human interaction from a user other than the attacker. If exploited, it could allow for unauthorized creation, deletion, or modification of critical data, potentially granting complete access to all data within the Hyperion Infrastructure Technology environment.",Oracle,Hyperion Infrastructure Technology,6.1,MEDIUM,0.0009399999980814755,false,,false,false,false,,,false,false,,2020-10-21T14:04:28.000Z,0