{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T07:00:40.951","vulnerabilities":[{"cve":{"id":"CVE-2017-3573","sourceIdentifier":"secalert_us@oracle.com","published":"2017-04-24T19:59:05.143","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: OPERA Printing). Supported versions that are affected are 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x and 5.5.1.x. Easily \"exploitable\" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality OPERA 5 Property Services, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized read access to a subset of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."},{"lang":"es","value":"Vulnerabilidad en el componente Oracle Hospitality OPERA 5 Property Services component de Oracle Hospitality Applications (subcomponente: OPERA Printing). Versiones compatibles que son afectadas son 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x y 5.5.1.x. Vulnerabilidad fácilmente explotable permite a atacante no autenticado con acceso a la red a través de HTTP para comprometer a Oracle Hospitality OPERA 5 Property Services. Los ataques exitosos requieren la interacción humana de una persona más que un atacante y mientras la vulnerabilidad está en los Servicios de Propiedad de Oracle Hospitality OPERA 5, los ataques pueden afectar significativamente a productos adicionales. Los ataques exitosos de esta vulnerabilidad pueden resultar en la actualización, inserción o eliminación de acceso no autorizados a algunos de los datos accesibles de Oracle Hospitality OPERA 5 Property Services así como al acceso de lectura no autorizado a un subconjunto de los datos accesibles de Oracle Hospitality OPERA 5 Property Services. CVSS 3.0 Base Score 6.1 (Impactos de confidencialidad e integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.0:*:*:*:*:*:*:*","matchCriteriaId":"FE431F81-E85E-42B7-B977-B4076A717C21"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.1:*:*:*:*:*:*:*","matchCriteriaId":"825F9006-E4DD-4583-AAF6-DF73545DF8E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.2:*:*:*:*:*:*:*","matchCriteriaId":"58E38734-2EB8-4048-9530-B27CC09FD10D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.4.3:*:*:*:*:*:*:*","matchCriteriaId":"DFB95F1A-0B62-475A-8883-A84D9E3D294F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.0:*:*:*:*:*:*:*","matchCriteriaId":"9068C68D-B69D-4B6F-8382-A972135C9959"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"393A0BE6-5B95-4D01-B78F-0BFB567B08E7"}]}]}],"references":[{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/97868","source":"secalert_us@oracle.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/97868","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}