{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T04:52:27.562","vulnerabilities":[{"cve":{"id":"CVE-2017-12360","sourceIdentifier":"psirt@cisco.com","published":"2017-11-30T09:29:01.307","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Cisco WebEx Network Recording Player for WebEx Recording Format (WRF) files could allow an attacker to cause a denial of service (DoS) condition. An attacker could exploit this vulnerability by providing a user with a malicious WRF file via email or URL and convincing the user to open the file. A successful exploit could cause an affected player to crash, resulting in a DoS condition. This vulnerability affects Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, and Cisco WebEx WRF players. Cisco Bug IDs: CSCve30294, CSCve30301."},{"lang":"es","value":"Una vulnerabilidad en Cisco WebEx Network Recording Player para archivos WebEx Recording Format (WRF) podría permitir que un atacante provoque una condición de denegación de servicio (DoS). Un atacante podría explotar esta vulnerabilidad proporcionándole a un usuario un archivo WRF malicioso mediante correo electrónico o URL y convenciéndolo para que abra el archivo. Un exploit con éxito podría dar lugar a que un reproductor afectado se cierre inesperadamente, provocando una condición de DoS. Esta vulnerabilidad afecta a sitios de reunión Cisco WebEx Business Suite, Cisco WebEx Meetings y a los reproductores Cisco WebEx WRF. Cisco Bug IDs: CSCve30294, CSCve30301."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-399"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:webex_meeting_center:t29:*:*:*:*:*:*:*","matchCriteriaId":"17BA5D45-3F53-4D9A-8D5C-6ADEC17BE474"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:webex_meeting_center:t30:*:*:*:*:*:*:*","matchCriteriaId":"5F6684FF-C2D7-440F-9FCF-9002F78A4CCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:webex_meeting_center:t31:*:*:*:*:*:*:*","matchCriteriaId":"0F4B95A9-34C9-4C3D-B68C-A48E7A190EDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:webex_meeting_center:t32:*:*:*:*:*:*:*","matchCriteriaId":"6C2F2F01-6B6B-4F77-95C6-4200325B2174"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/102001","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex1","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/102001","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}