Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.oracle.com/security-alerts/cpujan2026.html |
|
Wed, 21 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerability in the Oracle APEX Sample Applications product of Oracle APEX (component: Brookstrut Sample App). Supported versions that are affected are 23.2.0, 23.2.1, 24.1.0, 24.2.0 and 24.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle APEX Sample Applications. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle APEX Sample Applications, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle APEX Sample Applications accessible data as well as unauthorized read access to a subset of Oracle APEX Sample Applications accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | |
| First Time appeared |
Oracle
Oracle apex Sample Applications |
|
| CPEs | cpe:2.3:a:oracle:apex_sample_applications:23.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:apex_sample_applications:23.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:apex_sample_applications:24.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:apex_sample_applications:24.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:apex_sample_applications:24.2.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Oracle
Oracle apex Sample Applications |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2026-01-21T20:55:14.477Z
Reserved: 2026-01-05T18:07:34.709Z
Link: CVE-2026-21931
Updated: 2026-01-21T20:55:11.812Z
Status : Received
Published: 2026-01-20T22:15:55.667
Modified: 2026-01-20T22:15:55.667
Link: CVE-2026-21931
No data.
OpenCVE Enrichment
No data.
No weakness.