{"vulnerability": "CVE-2022-2161", "sightings": [{"uuid": "fe0bc64a-68e9-45b4-b170-9a90a8a212f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21611", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5994", "content": "|       PRION:CVE-2022-21605    3.3     https://vulners.com/prion/PRION:CVE-2022-21605              |       PRION:CVE-2022-21604    3.3     https://vulners.com/prion/PRION:CVE-2022-21604              |       PRION:CVE-2022-21599    3.3     https://vulners.com/prion/PRION:CVE-2022-21599              |       PRION:CVE-2022-21594    3.3     https://vulners.com/prion/PRION:CVE-2022-21594              |       PRION:CVE-2021-2307     3.3     https://vulners.com/prion/PRION:CVE-2021-2307\n|       PRION:CVE-2023-21875    3.2     https://vulners.com/prion/PRION:CVE-2023-21875\n|       PRION:CVE-2022-39403    3.0     https://vulners.com/prion/PRION:CVE-2022-39403\n|       PRION:CVE-2022-21486    2.9     https://vulners.com/prion/PRION:CVE-2022-21486\n|       PRION:CVE-2022-21485    2.9     https://vulners.com/prion/PRION:CVE-2022-21485              |       PRION:CVE-2022-21484    2.9     https://vulners.com/prion/PRION:CVE-2022-21484\n|       PRION:CVE-2022-21357    2.9     https://vulners.com/prion/PRION:CVE-2022-21357\n|       PRION:CVE-2022-21355    2.9     https://vulners.com/prion/PRION:CVE-2022-21355              |       PRION:CVE-2022-21333    2.9     https://vulners.com/prion/PRION:CVE-2022-21333              |       PRION:CVE-2022-21331    2.9     https://vulners.com/prion/PRION:CVE-2022-21331\n|       PRION:CVE-2022-21325    2.9     https://vulners.com/prion/PRION:CVE-2022-21325\n|       PRION:CVE-2022-21324    2.9     https://vulners.com/prion/PRION:CVE-2022-21324\n|       PRION:CVE-2022-21323    2.9     https://vulners.com/prion/PRION:CVE-2022-21323\n|       PRION:CVE-2022-21321    2.9     https://vulners.com/prion/PRION:CVE-2022-21321              |       PRION:CVE-2022-21319    2.9     https://vulners.com/prion/PRION:CVE-2022-21319\n|       PRION:CVE-2022-21317    2.9     https://vulners.com/prion/PRION:CVE-2022-21317\n|       PRION:CVE-2022-21313    2.9     https://vulners.com/prion/PRION:CVE-2022-21313              |       PRION:CVE-2022-21312    2.9     https://vulners.com/prion/PRION:CVE-2022-21312              |       PRION:CVE-2022-21311    2.9     https://vulners.com/prion/PRION:CVE-2022-21311\n|       PRION:CVE-2019-2797     2.3     https://vulners.com/prion/PRION:CVE-2019-2797\n|       PRION:CVE-2022-39402    2.1     https://vulners.com/prion/PRION:CVE-2022-39402\n|       PRION:CVE-2022-21460    2.1     https://vulners.com/prion/PRION:CVE-2022-21460\n|       PRION:CVE-2022-21451    2.1     https://vulners.com/prion/PRION:CVE-2022-21451              |       PRION:CVE-2022-21444    2.1     https://vulners.com/prion/PRION:CVE-2022-21444\n|       PRION:CVE-2021-35632    2.1     https://vulners.com/prion/PRION:CVE-2021-35632\n|       PRION:CVE-2021-2042     2.1     https://vulners.com/prion/PRION:CVE-2021-2042               |       PRION:CVE-2019-2969     2.1     https://vulners.com/prion/PRION:CVE-2019-2969               |       PRION:CVE-2021-2232     1.9     https://vulners.com/prion/PRION:CVE-2021-2232\n|       PRION:CVE-2019-2634     1.9     https://vulners.com/prion/PRION:CVE-2019-2634\n|       PRION:CVE-2019-2535     1.9     https://vulners.com/prion/PRION:CVE-2019-2535\n|       PRION:CVE-2018-3174     1.9     https://vulners.com/prion/PRION:CVE-2018-3174\n|       PRION:CVE-2018-3084     1.9     https://vulners.com/prion/PRION:CVE-2018-3084\n|       PRION:CVE-2023-22058    1.7     https://vulners.com/prion/PRION:CVE-2023-22058\n|       PRION:CVE-2022-21625    1.7     https://vulners.com/prion/PRION:CVE-2022-21625\n|       PRION:CVE-2022-21595    1.7     https://vulners.com/prion/PRION:CVE-2022-21595              |       PRION:CVE-2019-2536     1.2     https://vulners.com/prion/PRION:CVE-2019-2536\n|       PRION:CVE-2019-2513     1.2     https://vulners.com/prion/PRION:CVE-2019-2513\n|_      PRION:CVE-2022-21611    0.8     https://vulners.com/prion/PRION:CVE-2022-21611              8443/tcp  closed https-alt       conn-refused     30000/tcp closed ndmps           conn-refused     30718/tcp closed unknown         conn-refused     30951/tcp closed unknown         conn-refused", "creation_timestamp": "2023-11-15T17:01:59.000000Z"}, {"uuid": "8db1182d-999e-4d33-a993-12cbd43baf47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21617", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5993", "content": "|       PRION:CVE-2023-22110    3.3     https://vulners.com/prion/PRION:CVE-2023-22110              |       PRION:CVE-2023-22104    3.3     https://vulners.com/prion/PRION:CVE-2023-22104              |       PRION:CVE-2023-22103    3.3     https://vulners.com/prion/PRION:CVE-2023-22103              |       PRION:CVE-2023-22097    3.3     https://vulners.com/prion/PRION:CVE-2023-22097              |       PRION:CVE-2023-22092    3.3     https://vulners.com/prion/PRION:CVE-2023-22092              |       PRION:CVE-2023-22084    3.3     https://vulners.com/prion/PRION:CVE-2023-22084              |       PRION:CVE-2023-22078    3.3     https://vulners.com/prion/PRION:CVE-2023-22078              |       PRION:CVE-2023-22070    3.3     https://vulners.com/prion/PRION:CVE-2023-22070              |       PRION:CVE-2023-22068    3.3     https://vulners.com/prion/PRION:CVE-2023-22068              |       PRION:CVE-2023-22066    3.3     https://vulners.com/prion/PRION:CVE-2023-22066              |       PRION:CVE-2023-22065    3.3     https://vulners.com/prion/PRION:CVE-2023-22065              |       PRION:CVE-2023-22064    3.3     https://vulners.com/prion/PRION:CVE-2023-22064              |       PRION:CVE-2023-22057    3.3     https://vulners.com/prion/PRION:CVE-2023-22057              |       PRION:CVE-2023-22056    3.3     https://vulners.com/prion/PRION:CVE-2023-22056              |       PRION:CVE-2023-22054    3.3     https://vulners.com/prion/PRION:CVE-2023-22054              |       PRION:CVE-2023-22032    3.3     https://vulners.com/prion/PRION:CVE-2023-22032\n|       PRION:CVE-2023-22028    3.3     https://vulners.com/prion/PRION:CVE-2023-22028              |       PRION:CVE-2023-22026    3.3     https://vulners.com/prion/PRION:CVE-2023-22026\n|       PRION:CVE-2023-22015    3.3     https://vulners.com/prion/PRION:CVE-2023-22015\n|       PRION:CVE-2023-22007    3.3     https://vulners.com/prion/PRION:CVE-2023-22007              |       PRION:CVE-2023-21982    3.3     https://vulners.com/prion/PRION:CVE-2023-21982              |       PRION:CVE-2023-21976    3.3     https://vulners.com/prion/PRION:CVE-2023-21976\n|       PRION:CVE-2023-21972    3.3     https://vulners.com/prion/PRION:CVE-2023-21972\n|       PRION:CVE-2023-21950    3.3     https://vulners.com/prion/PRION:CVE-2023-21950\n|       PRION:CVE-2023-21887    3.3     https://vulners.com/prion/PRION:CVE-2023-21887\n|       PRION:CVE-2023-21883    3.3     https://vulners.com/prion/PRION:CVE-2023-21883\n|       PRION:CVE-2023-21882    3.3     https://vulners.com/prion/PRION:CVE-2023-21882              |       PRION:CVE-2023-21881    3.3     https://vulners.com/prion/PRION:CVE-2023-21881\n|       PRION:CVE-2023-21879    3.3     https://vulners.com/prion/PRION:CVE-2023-21879\n|       PRION:CVE-2023-21878    3.3     https://vulners.com/prion/PRION:CVE-2023-21878              |       PRION:CVE-2023-21876    3.3     https://vulners.com/prion/PRION:CVE-2023-21876              |       PRION:CVE-2022-39400    3.3     https://vulners.com/prion/PRION:CVE-2022-39400\n|       PRION:CVE-2022-21641    3.3     https://vulners.com/prion/PRION:CVE-2022-21641\n|       PRION:CVE-2022-21640    3.3     https://vulners.com/prion/PRION:CVE-2022-21640\n|       PRION:CVE-2022-21638    3.3     https://vulners.com/prion/PRION:CVE-2022-21638\n|       PRION:CVE-2022-21637    3.3     https://vulners.com/prion/PRION:CVE-2022-21637              |       PRION:CVE-2022-21633    3.3     https://vulners.com/prion/PRION:CVE-2022-21633\n|       PRION:CVE-2022-21632    3.3     https://vulners.com/prion/PRION:CVE-2022-21632\n|       PRION:CVE-2022-21617    3.3     https://vulners.com/prion/PRION:CVE-2022-21617              |       PRION:CVE-2022-21608    3.3     https://vulners.com/prion/PRION:CVE-2022-21608              |       PRION:CVE-2022-21607    3.3     https://vulners.com/prion/PRION:CVE-2022-21607", "creation_timestamp": "2023-11-15T17:01:59.000000Z"}, {"uuid": "848735fc-a057-4921-bfdc-5fe3e9fdb21f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2161", "type": "seen", "source": "https://t.me/true_secator/3090", "content": "\u041d\u0430 \u044d\u0442\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0441\u0442\u0430\u0431\u0438\u043b\u044c\u043d\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e Chrome 103,\n\u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0432 14 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u0438\u0437 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043e\u0448\u0438\u0431\u043e\u043a \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2022-2156 \u0432 Base, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u043b\u0438 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438. \n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u041c\u0430\u0440\u043a \u0411\u0440\u044d\u043d\u0434 \u0438\u0437 Google Project Zero.\n\n\u0412 \u0441\u043e\u0447\u0435\u0442\u0430\u043d\u0438\u0438 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0448\u0438\u0431\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u0445\u043e\u0434\u0443 \u0438\u0437 \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 \u0438\u043b\u0438 \u043f\u043e\u043b\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u0412 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Chrome 103 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0442\u0430\u043a\u0436\u0435 \u0442\u0440\u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0435 \u043d\u0430 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b:\n\n- Interest groups (CVE-2022-2157, \u0432\u044b\u0441\u043e\u043a\u0430\u044f \u0441\u0442\u0435\u043f\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043e\u0431 \u043e\u0448\u0438\u0431\u043a\u0435 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u041d\u0430\u043d \u0412\u0430\u043d \u0438 \u0413\u0443\u0430\u043d \u0413\u0443\u043d \u0438\u0437 360 Alpha Lab),\n- WebApp Provider (CVE-2022-2161, \u0441\u0440\u0435\u0434\u043d\u044f\u044f \u0441\u0442\u0435\u043f\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u0427\u0436\u0438\u0445\u0443\u0430 \u042f\u043e \u0438\u0437 KunLun Lab),\n- Cast UI and Toolbar (CVE-2022-2163, \u043d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c, \u0441\u043e\u043e\u0431\u0449\u0438\u043b \u0427\u0430\u043e\u044e\u0430\u043d\u044c \u041f\u044d\u043d).\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Chrome \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0435\u0439 \u0442\u0438\u043f\u043e\u0432 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 V8 JavaScript \u0438 WebAssembly - CVE-2022-2158, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0411\u043e\u0445\u0430\u043d \u041b\u044e \u0438\u0437 Tencent Security Xuanwu Lab.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0438 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u043f\u043e\u043b\u0438\u0442\u0438\u043a \u0432 DevTools (CVE-2022-2160), API \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b (CVE-2022-2162), \u043d\u0435\u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u0443\u044e \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u0432 Extensions API (CVE-2022-2164 \u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0443\u044e \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0438 URL (CVE-2022-2165).\n\nGoogle \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u0432\u044b\u043f\u043b\u0430\u0442\u0438\u043b\u0430 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 44 000 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432 \u0421\u0428\u0410 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043e\u043a, \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u043e\u0431 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u043d\u0435 \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u0432\u044b\u043f\u0443\u0441\u043a Chrome \u0432 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0434\u043b\u044f Windows, Mac \u0438 Linux \u043a\u0430\u043a \u0432\u0435\u0440\u0441\u0438\u044f 103.0.5060.53, \u0442\u0430\u043a \u0447\u0442\u043e \u0432\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.", "creation_timestamp": "2022-06-23T10:20:36.000000Z"}, {"uuid": "beb85632-2f3c-4fce-b5ff-7a64e3a691a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21614", "type": "seen", "source": "https://t.me/cibsecurity/51715", "content": "\u203c CVE-2022-21614 \u203c\n\nVulnerability in the Oracle Enterprise Data Quality product of Oracle Fusion Middleware (component: Dashboard). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Data Quality. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Data Quality accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:14:47.000000Z"}, {"uuid": "7353ea4d-6a5b-4cc8-ae98-b60011a94d71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21618", "type": "seen", "source": "https://t.me/cibsecurity/51710", "content": "\u203c CVE-2022-21618 \u203c\n\nVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:14:39.000000Z"}]}