{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T22:40:51.866","vulnerabilities":[{"cve":{"id":"CVE-2017-6754","sourceIdentifier":"psirt@cisco.com","published":"2017-08-07T06:29:00.417","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of the Cisco Smart Net Total Care (SNTC) Software Collector Appliance 3.11 could allow an authenticated, remote attacker to perform a read-only, blind SQL injection attack, which could allow the attacker to compromise the confidentiality of the system through SQL timing attacks. The vulnerability is due to insufficient input validation of certain user-supplied fields that are subsequently used by the affected software to build SQL queries. An attacker could exploit this vulnerability by submitting crafted URLs, which are designed to exploit the vulnerability, to the affected software. To execute an attack successfully, the attacker would need to submit a number of requests to the affected software. A successful exploit could allow the attacker to determine the presence of values in the SQL database of the affected software. Cisco Bug IDs: CSCvf07617."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de gestión basada en web de Cisco Smart Net Total Care (SNTC) Software Collector Appliance 3.11 podría permitir que un atacante remoto autenticado realice un ataque ciego de sólo lectura de inyección SQL, lo que haría que este comprometiese la confidencialidad del sistema mediante ataques SQL basados en tiempo. La vulnerabilidad se debe a que no se validan lo suficiente los campos de entrada de datos de usuario que son, posteriormente, empleados por el software afectado para realizar consultas SQL. Un atacante podría explotar esta vulnerabilidad enviando al software afectado URL manipuladas diseñadas para este fin. Para llevar a cabo este ataque de forma exitosa, el atacante necesitaría enviar una serie de peticiones al software afectado. Si se realiza correctamente, esta vulnerabilidad podría permitir que el atacante determine la presencia de valores en la base de datos SQL del software afectado. Cisco Bug IDs: CSCvf07617."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:smart_net_total_care_collector_appliance:3.11:*:*:*:*:*:*:*","matchCriteriaId":"07DA489C-B051-45DB-B068-96E09B7E57BF"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/100126","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf07617","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-sntc","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/100126","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf07617","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-sntc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}