{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T04:34:23.521","vulnerabilities":[{"cve":{"id":"CVE-2017-3347","sourceIdentifier":"secalert_us@oracle.com","published":"2017-04-25T19:59:00.287","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily \"exploitable\" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized read access to a subset of Oracle Marketing accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente Oracle Marketing de Oracle E-Business Suite (subcomponente: interfaz de usuario). Las versiones afectadas son: 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 y 12.2.6. La vulnerabilidad, fácilmente explotable, permite a atacantes no autenticados que tengan acceso a la red a través de tráfico HTTP comprometer dicho componente. Para que el ataque tenga éxito es necesaria la interacción de otra persona además del atacante. La explotación del fallo puede derivar en la creación, eliminación o modificación de información sensible o el acceso a toda la información de Oracle Marketing, así como la lectura de cierta información a la que tiene acceso el propio componente. CVSS 3.0 Base Score 7.1 (impacto en la confidencialidad y en la integridad). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N)."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*","matchCriteriaId":"FE5E189E-FB41-4332-A037-3DDA98746371"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*","matchCriteriaId":"5EC9AAD6-30EF-4F5B-9923-2619E75C66B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*","matchCriteriaId":"EDB00EEA-140F-4652-AF01-5FE522E5D1BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*","matchCriteriaId":"6CEB6C88-B08C-44B2-8330-57B5BD931A56"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*","matchCriteriaId":"F8273378-896F-4EA3-884C-47B31422028C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*","matchCriteriaId":"704D9437-039F-46F4-ACC4-C8C10C56E251"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*","matchCriteriaId":"F8C98EA8-6D5A-40DF-8232-818C8BB2FB9B"}]}]}],"references":[{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98060","source":"secalert_us@oracle.com"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98060","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}