{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T19:49:30.998","vulnerabilities":[{"cve":{"id":"CVE-2017-3434","sourceIdentifier":"secalert_us@oracle.com","published":"2017-04-25T19:59:00.380","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: Audience workbench). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily \"exploitable\" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle One-to-One Fulfillment accessible data as well as unauthorized read access to a subset of Oracle One-to-One Fulfillment accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente Oracle One-to-One Fulfillment de Oracle E-Business Suite (subcomponente: Audience workbench). Las versiones afectadas son: 12.1.1, 12.1.2 y 12.1.3. La vulnerabilidad, fácilmente explotable, permite a atacantes no autenticados que tengan acceso a la red a través de tráfico HTTP comprometer dicho componente. Para que el ataque tenga éxito es necesaria la interacción de otra persona además del atacante. La explotación del fallo puede derivar en la creación, eliminación o modificación de información sensible o el acceso a toda la información de Oracle One-to-One Fulfillment, así como la lectura de cierta información a la que tiene acceso el propio componente. CVSS 3.0 Base Score 7.1 (impacto en la confidencialidad y en la integridad). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N)."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:one-to-one_fulfillment:12.1.1:*:*:*:*:*:*:*","matchCriteriaId":"818AA91A-F9EC-42D3-8BF2-40AE61D214C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:one-to-one_fulfillment:12.1.2:*:*:*:*:*:*:*","matchCriteriaId":"225B4D6A-7136-49B1-B537-DE573BFEBCFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:one-to-one_fulfillment:12.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2C6374C8-AD2E-4997-AE75-D91F1AF90206"}]}]}],"references":[{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98054","source":"secalert_us@oracle.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98054","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}