cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-21503,https://securityvulnerability.io/vulnerability/CVE-2022-21503,Unauthorized Access Vulnerability in Oracle Cloud Infrastructure by Oracle,"An exploitable vulnerability exists within Oracle Cloud Infrastructure, allowing high-privileged attackers with network access to compromise sensitive data. Attackers can gain unauthorized access to data stored in the cloud environment, leading to potential data breaches. Oracle has proactively informed all affected customers. It is crucial for users to assess their security measures and remain vigilant against potential exploit attempts.",Oracle,Oracle Cloud Infrastructure,4.9,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2022-06-17T20:20:11.000Z,0 CVE-2021-2138,https://securityvulnerability.io/vulnerability/CVE-2021-2138,Vulnerability in Oracle Cloud Infrastructure Data Science Notebook Sessions,"This vulnerability in Oracle Cloud Infrastructure Data Science Notebook Sessions allows a low privileged attacker, with network access, to exploit weaknesses in the system. Attackers could gain unauthorized access to data through update, insert, or delete operations, as well as unauthorized read access to accessible data subsets. The flaw emphasizes the importance of securing physical communication segments to ensure data integrity and confidentiality within Oracle's cloud infrastructure.",Oracle,Oracle Cloud Infrastructure Data Science Notebook Sessions,4.6,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2021-03-03T05:50:14.000Z,0 CVE-2020-14874,https://securityvulnerability.io/vulnerability/CVE-2020-14874,Vulnerability in Oracle Cloud Infrastructure Identity and Access Management,"A vulnerability exists within Oracle Cloud Infrastructure Identity and Access Management that can be exploited by a high privileged attacker with network access. This flaw allows for unauthorized updates, insertions, or deletions of accessible data. Additionally, it can lead to unauthorized read access to certain data and the ability to partially disrupt services, resulting in a significant risk to cloud service integrity and availability.",Oracle,Oracle Cloud Infrastructure Identity And Access Management,4.7,MEDIUM,0.000910000002477318,false,,false,false,false,,,false,false,,2020-12-22T21:40:14.000Z,0