{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T16:43:46.378","vulnerabilities":[{"cve":{"id":"CVE-2017-12364","sourceIdentifier":"psirt@cisco.com","published":"2017-11-30T09:29:01.447","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A SQL Injection vulnerability in the web framework of Cisco Prime Service Catalog could allow an unauthenticated, remote attacker to execute unauthorized Structured Query Language (SQL) queries. The vulnerability is due to a failure to validate user-supplied input that is used in SQL queries. An attacker could exploit this vulnerability by sending a crafted SQL statement to an affected system. Successful exploitation could allow the attacker to read entries in some database tables. Cisco Bug IDs: CSCvg30333."},{"lang":"es","value":"Una vulnerabilidad de inyección SQL en el framework web de Cisco Prime Service Catalog podría permitir que un atacante remoto no autenticado ejecute consultas SQL (Structured Query Language) no autorizadas. Esto se debe a la imposibilidad de validar entradas proporcionadas por el usuario empleadas en consultas SQL. Un atacante podría explotar esta vulnerabilidad enviando una instrucción SQL manipulada a un dispositivo afectado. La explotación con éxito podría permitir que el atacante lea entradas en algunas tablas de bases de datos. Cisco Bug IDs: CSCvg30333."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_service_catalog:11.1.1:*:*:*:*:*:*:*","matchCriteriaId":"A01615DA-643D-4576-BC1E-2274741FA79B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_service_catalog:12.0:*:*:*:*:*:*:*","matchCriteriaId":"B1B14BBE-9BF7-4D8C-BB45-F6785A13748D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_service_catalog:12.1:*:*:*:*:*:*:*","matchCriteriaId":"9DC32B55-0C76-4669-8EAD-DCC16355E887"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/102004","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1039926","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-prime","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/102004","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1039926","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-prime","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}