// For flags

CVE-2017-3246

 

Severity Score

6.0
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Patching). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Application Object Library executes to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Application Object Library accessible data as well as unauthorized access to critical data or complete access to all Oracle Application Object Library accessible data. CVSS v3.0 Base Score 6.0 (Confidentiality and Integrity impacts).

Vulnerabilidad en el componente Oracle Application Object Library de Oracle E-Business Suite (subcomponente: Patching). Versiones compatibles que están afectadas son 12.1.3, 12.2.3, 12.2.4, 12.2.5 y 12.2.6. Vulnerabilidad fácilmente explotable permite a atacante con privilegios elevados con inicio de sesión en la infraestructura donde Oracle Application Object Library se ejecuta, compromete Oracle Application Object Library. Ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a datos críticos o acceso completo a todos los datos accesibles de Oracle Application Object Library así como acceso no autorizado a datos críticos o acceso completo a todos los datos accesibles de Oracle Application Object Library. CVSS v3.0 Base Score 6.0 (Impactos de Confidencialidad e Integridad).

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2016-12-06 CVE Reserved
  • 2017-01-27 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-10-09 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Application Object Library
Search vendor "Oracle" for product "Application Object Library"
12.1.3
Search vendor "Oracle" for product "Application Object Library" and version "12.1.3"
-
Affected
Oracle
Search vendor "Oracle"
Application Object Library
Search vendor "Oracle" for product "Application Object Library"
12.2.3
Search vendor "Oracle" for product "Application Object Library" and version "12.2.3"
-
Affected
Oracle
Search vendor "Oracle"
Application Object Library
Search vendor "Oracle" for product "Application Object Library"
12.2.4
Search vendor "Oracle" for product "Application Object Library" and version "12.2.4"
-
Affected
Oracle
Search vendor "Oracle"
Application Object Library
Search vendor "Oracle" for product "Application Object Library"
12.2.5
Search vendor "Oracle" for product "Application Object Library" and version "12.2.5"
-
Affected
Oracle
Search vendor "Oracle"
Application Object Library
Search vendor "Oracle" for product "Application Object Library"
12.2.6
Search vendor "Oracle" for product "Application Object Library" and version "12.2.6"
-
Affected