Auto-Update: 2024-11-22T19:12:10.918177+00:00

This commit is contained in:
cad-safe-bot 2024-11-22 19:15:24 +00:00
parent 609c02436e
commit 9f94faf850
8001 changed files with 274072 additions and 46971 deletions

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4894",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-10-05T10:51:16.020",
"lastModified": "2017-08-29T01:32:25.087",
"lastModified": "2024-11-21T01:43:42.273",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -127,6 +126,26 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78676",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/85570",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://support.google.com/sketchup/bin/static.py?page=release_notes.cs",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://technet.microsoft.com/security/msvr/msvr12-015",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/55598",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78676",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4895",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-10-05T10:51:16.083",
"lastModified": "2020-03-11T14:58:40.817",
"lastModified": "2024-11-21T01:43:42.413",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -219,6 +218,18 @@
{
"url": "http://technet.microsoft.com/security/msvr/msvr12-014",
"source": "cve@mitre.org"
},
{
"url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/50656",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://technet.microsoft.com/security/msvr/msvr12-014",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4896",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-10-05T10:51:16.130",
"lastModified": "2020-03-11T14:58:40.817",
"lastModified": "2024-11-21T01:43:42.560",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -219,6 +218,18 @@
{
"url": "http://technet.microsoft.com/security/msvr/msvr12-014",
"source": "cve@mitre.org"
},
{
"url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/50656",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://technet.microsoft.com/security/msvr/msvr12-014",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,10 +2,8 @@
"id": "CVE-2012-4897",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-10-05T17:55:00.817",
"lastModified": "2017-08-29T01:32:25.133",
"lastModified": "2024-11-21T01:43:42.700",
"vulnStatus": "Modified",
"cveTags": [],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'",
"descriptions": [
{
"lang": "en",
@ -24,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 6.9,
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
@ -121,6 +119,30 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79046",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0069.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/85957",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/55802",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0014.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79046",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'"
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4898",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2012-12-18T12:30:05.920",
"lastModified": "2013-01-29T05:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:42.850",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:P/A:N",
"baseScore": 6.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 6.1
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
@ -126,6 +125,13 @@
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-297-01.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4899",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-10-10T18:55:05.550",
"lastModified": "2013-01-30T05:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:42.963",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 2.1,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
@ -112,6 +111,21 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4903",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-13T20:55:01.510",
"lastModified": "2012-09-14T04:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:43.557",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -95,6 +94,17 @@
{
"url": "https://code.google.com/p/chromium/issues/detail?id=138210",
"source": "cve@mitre.org"
},
{
"url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-android-update.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://code.google.com/p/chromium/issues/detail?id=138210",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4904",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-13T20:55:01.557",
"lastModified": "2012-09-14T13:20:50.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:43.693",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -95,6 +94,17 @@
{
"url": "https://code.google.com/p/chromium/issues/detail?id=138035",
"source": "cve@mitre.org"
},
{
"url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-android-update.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://code.google.com/p/chromium/issues/detail?id=138035",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4905",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-13T20:55:01.603",
"lastModified": "2012-09-14T13:22:43.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:43.830",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -95,6 +94,17 @@
{
"url": "https://code.google.com/p/chromium/issues/detail?id=144813",
"source": "cve@mitre.org"
},
{
"url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-android-update.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://code.google.com/p/chromium/issues/detail?id=144813",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4906",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-13T20:55:01.667",
"lastModified": "2012-09-14T13:23:37.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:43.970",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -95,6 +94,17 @@
{
"url": "https://code.google.com/p/chromium/issues/detail?id=144820",
"source": "cve@mitre.org"
},
{
"url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-android-update.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://code.google.com/p/chromium/issues/detail?id=144820",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4907",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-13T20:55:01.713",
"lastModified": "2012-09-14T13:25:53.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:44.100",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -95,6 +94,17 @@
{
"url": "https://code.google.com/p/chromium/issues/detail?id=137532",
"source": "cve@mitre.org"
},
{
"url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-android-update.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://code.google.com/p/chromium/issues/detail?id=137532",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4908",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-13T20:55:01.777",
"lastModified": "2012-09-14T13:30:58.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:44.243",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -95,6 +94,17 @@
{
"url": "https://code.google.com/p/chromium/issues/detail?id=144866",
"source": "cve@mitre.org"
},
{
"url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-android-update.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://code.google.com/p/chromium/issues/detail?id=144866",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4909",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-13T20:55:01.837",
"lastModified": "2012-09-14T13:31:49.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:44.380",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -95,6 +94,17 @@
{
"url": "https://code.google.com/p/chromium/issues/detail?id=141889",
"source": "cve@mitre.org"
},
{
"url": "http://googlechromereleases.blogspot.com/2012/09/chrome-for-android-update.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://code.google.com/p/chromium/issues/detail?id=141889",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4912",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2012-09-28T10:40:22.333",
"lastModified": "2013-02-07T05:00:02.437",
"lastModified": "2024-11-21T01:43:44.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -158,6 +157,43 @@
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=745425",
"source": "PSIRT-CNA@flexerasoftware.com"
},
{
"url": "http://download.novell.com/Download?buildid=O5hTjIiMdMo~",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/50622",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.novell.com/support/kb/doc.php?id=7010768",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55814",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1027614",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702788",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.novell.com/show_bug.cgi?id=745425",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4914",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2013-01-26T23:55:01.103",
"lastModified": "2013-01-28T05:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:44.660",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -82,6 +81,17 @@
{
"url": "http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=70&Itemid=70",
"source": "PSIRT-CNA@flexerasoftware.com"
},
{
"url": "http://secunia.com/advisories/51602",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=70&Itemid=70",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4917",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2013-01-26T23:55:01.150",
"lastModified": "2013-02-02T05:09:00.693",
"lastModified": "2024-11-21T01:43:44.867",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -82,6 +81,17 @@
{
"url": "http://www.securityfocus.com/bid/57535",
"source": "PSIRT-CNA@flexerasoftware.com"
},
{
"url": "http://secunia.com/advisories/51410",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57535",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4918",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2013-01-22T23:55:02.807",
"lastModified": "2017-08-29T01:32:25.290",
"lastModified": "2024-11-21T01:43:44.973",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"baseScore": 5.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.8
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -90,6 +89,25 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81116",
"source": "PSIRT-CNA@flexerasoftware.com"
},
{
"url": "http://osvdb.org/89070",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/51366",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/57225",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81116",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4920",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2014-04-04T14:55:04.917",
"lastModified": "2017-08-29T01:32:25.370",
"lastModified": "2024-11-21T01:43:45.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -202,6 +201,29 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81156",
"source": "PSIRT-CNA@flexerasoftware.com"
},
{
"url": "http://osvdb.org/89069",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/50833",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://wordpress.org/plugins/zingiri-forum/changelog",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81156",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4921",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2014-04-10T20:29:18.517",
"lastModified": "2014-04-11T13:24:00.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:45.290",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -82,6 +81,17 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/89441",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/51531",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4922",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-14T18:55:04.980",
"lastModified": "2013-08-22T03:59:11.687",
"lastModified": "2024-11-21T01:43:45.397",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -579,6 +578,38 @@
{
"url": "https://trac.torproject.org/projects/tor/ticket/6811",
"source": "cve@mitre.org"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00005.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://openwall.com/lists/oss-security/2012/09/12/5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201301-03.xml",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://gitweb.torproject.org/tor.git/commit/973c18bf0e84d14d8006a9ae97fde7f7fb97e404",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.torproject.org/pipermail/tor-talk/2012-September/025501.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://trac.torproject.org/projects/tor/ticket/6811",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4923",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-15T17:55:07.223",
"lastModified": "2017-08-29T01:32:25.417",
"lastModified": "2024-11-21T01:43:45.560",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -93,6 +92,28 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73330",
"source": "cve@mitre.org"
},
{
"url": "http://packetstormsecurity.org/files/109942/Endian-UTM-Firewall-2.4.x-Cross-Site-Scripting.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/52076",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vulnerability-lab.com/get_content.php?id=436",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73330",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4924",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-15T17:55:07.473",
"lastModified": "2017-08-29T01:32:25.477",
"lastModified": "2024-11-21T01:43:45.697",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -106,6 +105,36 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73384",
"source": "cve@mitre.org"
},
{
"url": "http://dsecrg.com/pages/vul/show.php?id=417",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/79438",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/48125",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/18538",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/52110",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73384",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4925",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-15T17:55:07.520",
"lastModified": "2017-08-29T01:32:25.527",
"lastModified": "2024-11-21T01:43:45.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -107,6 +106,42 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73526",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0180.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/48182",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/18544",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.osvdb.org/79670",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/52195",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73526",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4926",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-15T17:55:07.567",
"lastModified": "2012-09-18T04:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:45.993",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"baseScore": 6.4,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -85,6 +84,20 @@
"tags": [
"Exploit"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0180.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.exploit-db.com/exploits/18544",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4927",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-15T17:55:08.397",
"lastModified": "2017-08-29T01:32:25.587",
"lastModified": "2024-11-21T01:43:46.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -173,6 +172,47 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73395",
"source": "cve@mitre.org"
},
{
"url": "http://freecode.com/projects/limesurvey/releases/342070",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/79459",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.org/files/110100/limesurvey-sql.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/48051",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/18508",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.limesurvey.org/en/stable-release",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/52114",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73395",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4928",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-15T17:55:08.753",
"lastModified": "2017-08-29T01:32:25.650",
"lastModified": "2024-11-21T01:43:46.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -96,6 +95,31 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73399",
"source": "cve@mitre.org"
},
{
"url": "http://advisories.ariko-security.com/2012/audyt_bezpieczenstwa_2m2.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://packetstormsecurity.org/files/110046/Oxwall-1.1.1-Cross-Site-Scripting.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/52125",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73399",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4929",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-15T18:55:03.187",
"lastModified": "2018-04-22T01:29:00.363",
"lastModified": "2024-11-21T01:43:46.407",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
@ -141,6 +140,10 @@
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://news.ycombinator.com/item?id=4510829",
"source": "cve@mitre.org"
@ -232,6 +235,146 @@
{
"url": "https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212",
"source": "cve@mitre.org"
},
{
"url": "http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://code.google.com/p/chromium/issues/detail?id=139744",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://jvn.jp/en/jp/JVN65273415/index.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://news.ycombinator.com/item?id=4510829",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0587.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://support.apple.com/kb/HT5784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.debian.org/security/2012/dsa-2579",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.debian.org/security/2013/dsa-2627",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.debian.org/security/2015/dsa-3253",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ekoparty.org/2012/thai-duong.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/55704",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.theregister.co.uk/2012/09/14/crime_tls_attack/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ubuntu.com/usn/USN-1627-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ubuntu.com/usn/USN-1628-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ubuntu.com/usn/USN-1898-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=857051",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://chromiumcodereview.appspot.com/10825183",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://gist.github.com/3696912",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/mpgn/CRIME-poc",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4930",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-15T18:55:03.250",
"lastModified": "2013-01-30T04:55:34.587",
"lastModified": "2024-11-21T01:43:46.573",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
@ -112,6 +111,42 @@
{
"url": "https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls",
"source": "cve@mitre.org"
},
{
"url": "http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ekoparty.org/2012/thai-duong.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.theregister.co.uk/2012/09/14/crime_tls_attack/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=857737",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4932",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-28T11:48:44.627",
"lastModified": "2013-10-11T14:51:40.503",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:46.720",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -99,6 +98,13 @@
"tags": [
"Exploit"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0074.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4933",
"sourceIdentifier": "cret@cert.org",
"published": "2012-10-20T18:55:01.303",
"lastModified": "2017-08-29T01:32:25.697",
"lastModified": "2024-11-21T01:43:46.847",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8
"availabilityImpact": "NONE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -93,6 +92,28 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79252",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/332412",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securitytracker.com/id?1027682",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://community.rapid7.com/community/metasploit/blog/2012/10/15/cve-2012-4933-novell-zenworks",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79252",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4934",
"sourceIdentifier": "cret@cert.org",
"published": "2012-10-31T10:50:32.327",
"lastModified": "2017-08-29T01:32:25.760",
"lastModified": "2024-11-21T01:43:46.940",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
@ -90,6 +89,25 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79696",
"source": "cret@cert.org"
},
{
"url": "http://osvdb.org/86883",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/207540",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56333",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79696",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4935",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:00.743",
"lastModified": "2017-08-29T01:32:25.807",
"lastModified": "2024-11-21T01:43:47.047",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -90,6 +89,25 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79783",
"source": "cret@cert.org"
},
{
"url": "http://secunia.com/advisories/51203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/802596",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56381",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79783",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4936",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:00.790",
"lastModified": "2017-08-29T01:32:25.870",
"lastModified": "2024-11-21T01:43:47.147",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -90,6 +89,25 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79784",
"source": "cret@cert.org"
},
{
"url": "http://secunia.com/advisories/51203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/802596",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56381",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79784",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,10 +2,8 @@
"id": "CVE-2012-4937",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:00.837",
"lastModified": "2017-08-29T01:32:25.917",
"lastModified": "2024-11-21T01:43:47.250",
"vulnStatus": "Modified",
"cveTags": [],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html 'CWE-384: Session Fixation'",
"descriptions": [
{
"lang": "en",
@ -24,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -91,6 +89,26 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79785",
"source": "cret@cert.org"
},
{
"url": "http://secunia.com/advisories/51203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/802596",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56381",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79785",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html 'CWE-384: Session Fixation'"
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4938",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:00.883",
"lastModified": "2017-08-29T01:32:25.977",
"lastModified": "2024-11-21T01:43:47.360",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
@ -90,6 +89,25 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79786",
"source": "cret@cert.org"
},
{
"url": "http://secunia.com/advisories/51203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/802596",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56381",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79786",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4939",
"sourceIdentifier": "cret@cert.org",
"published": "2012-10-31T19:55:00.950",
"lastModified": "2012-11-02T04:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:47.460",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -125,6 +124,14 @@
"Exploit",
"US Government Resource"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/203844",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"US Government Resource"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4940",
"sourceIdentifier": "cret@cert.org",
"published": "2012-10-31T19:55:00.983",
"lastModified": "2013-02-26T04:51:00.817",
"lastModified": "2024-11-21T01:43:47.570",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"baseScore": 6.4,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 6.4
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -82,6 +81,17 @@
{
"url": "http://www.securityfocus.com/bid/56343",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/586556",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56343",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4941",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:00.930",
"lastModified": "2013-06-26T03:14:47.883",
"lastModified": "2024-11-21T01:43:47.673",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -89,6 +88,17 @@
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/427547",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4942",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:00.977",
"lastModified": "2013-06-26T03:14:47.960",
"lastModified": "2024-11-21T01:43:47.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -89,6 +88,17 @@
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/427547",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4943",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:01.010",
"lastModified": "2017-08-29T01:32:26.040",
"lastModified": "2024-11-21T01:43:47.867",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -93,6 +92,21 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79854",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/427547",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79854",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,10 +2,8 @@
"id": "CVE-2012-4944",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:01.057",
"lastModified": "2013-06-26T03:14:48.137",
"lastModified": "2024-11-21T01:43:47.967",
"vulnStatus": "Modified",
"cveTags": [],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html\r\n\r\n'CWE-434: Unrestricted Upload of File with Dangerous Type'",
"descriptions": [
{
"lang": "en",
@ -24,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -90,6 +88,18 @@
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/427547",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html\r\n\r\n'CWE-434: Unrestricted Upload of File with Dangerous Type'"
}

View File

@ -2,10 +2,8 @@
"id": "CVE-2012-4945",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:01.087",
"lastModified": "2013-06-26T03:14:48.210",
"lastModified": "2024-11-21T01:43:48.070",
"vulnStatus": "Modified",
"cveTags": [],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html 'Command Injection'",
"descriptions": [
{
"lang": "en",
@ -24,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -90,6 +88,18 @@
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/427547",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html 'Command Injection'"
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4946",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:01.117",
"lastModified": "2017-08-29T01:32:26.087",
"lastModified": "2024-11-21T01:43:48.163",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -93,6 +92,21 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79857",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/427547",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79857",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4947",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:01.167",
"lastModified": "2017-08-29T01:32:26.150",
"lastModified": "2024-11-21T01:43:48.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -93,6 +92,21 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79858",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/427547",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56427",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79858",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4948",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-14T12:30:59.507",
"lastModified": "2016-12-07T18:14:04.170",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:48.363",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:H/Au:N/C:C/I:P/A:N",
"baseScore": 5.3,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.2,
@ -231,6 +230,26 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://osvdb.org/87048",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/111708",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56382",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4949",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-14T12:30:59.537",
"lastModified": "2024-07-11T18:06:00.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:48.467",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -86,6 +85,21 @@
"tags": [
"VDB Entry"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/795644",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79977",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4950",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T21:55:01.197",
"lastModified": "2017-08-29T01:32:26.243",
"lastModified": "2024-11-21T01:43:48.580",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -94,6 +93,29 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79787",
"source": "cret@cert.org"
},
{
"url": "http://osvdb.org/87053",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/51203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/802596",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56381",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79787",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4951",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-15T11:58:40.057",
"lastModified": "2017-08-29T01:32:26.307",
"lastModified": "2024-11-21T01:43:48.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -104,6 +103,28 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79832",
"source": "cret@cert.org"
},
{
"url": "http://www.clearskies.net/documents/css-advisory-css1211-vericentre.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/180091",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56409",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79832",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4952",
"sourceIdentifier": "cret@cert.org",
"published": "2013-05-01T12:00:07.190",
"lastModified": "2013-05-21T04:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:48.773",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -93,6 +92,27 @@
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.dentrix.com/support/software-updates/g5.aspx",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/948155",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/JALR-8ZRHUK",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4953",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-14T12:30:59.727",
"lastModified": "2013-03-12T03:17:30.897",
"lastModified": "2024-11-21T01:43:48.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -136,6 +135,25 @@
{
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20121107_00",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/985625",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56399",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1027726",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20121107_00",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4954",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-15T11:58:40.103",
"lastModified": "2020-06-04T13:16:32.160",
"lastModified": "2024-11-21T01:43:48.980",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
@ -288,6 +287,21 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80000",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/611988",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56483",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80000",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4955",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-15T11:58:40.167",
"lastModified": "2017-08-29T01:32:26.417",
"lastModified": "2024-11-21T01:43:49.093",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -201,6 +200,50 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80071",
"source": "cret@cert.org"
},
{
"url": "http://osvdb.org/87405",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/51297",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.dell.com/support/drivers/us/en/19/DriverDetails/Product/poweredge-r710?driverId=5JDN0&osCode=WNET&fileId=3082293694",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.dell.com/support/drivers/us/en/19/DriverDetails/Product/poweredge-r710?driverId=JJMWP&osCode=WNET&fileId=3082295338",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.dell.com/support/drivers/us/en/19/DriverDetails/Product/poweredge-r710?driverId=PCXMR&osCode=WNET&fileId=3082295344",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/558132",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/56518",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80071",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4956",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T19:55:01.337",
"lastModified": "2013-05-03T03:25:40.033",
"lastModified": "2024-11-21T01:43:49.203",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -89,6 +88,24 @@
"tags": [
"Exploit"
]
},
{
"url": "http://osvdb.org/87574",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/273371",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4957",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T19:55:01.417",
"lastModified": "2012-11-19T19:21:00.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:49.303",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8
"availabilityImpact": "NONE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -82,6 +81,17 @@
{
"url": "https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/273371",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4958",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T19:55:01.463",
"lastModified": "2012-11-19T19:23:04.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:49.400",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8
"availabilityImpact": "NONE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -82,6 +81,17 @@
{
"url": "https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/273371",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4959",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-18T19:55:01.510",
"lastModified": "2012-11-19T19:24:52.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:49.500",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -82,6 +81,17 @@
{
"url": "https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959",
"source": "cret@cert.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/273371",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4960",
"sourceIdentifier": "cret@cert.org",
"published": "2013-06-20T15:55:00.897",
"lastModified": "2013-08-22T03:59:17.713",
"lastModified": "2024-11-21T01:43:49.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -639,6 +638,20 @@
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/948096",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4964",
"sourceIdentifier": "cret@cert.org",
"published": "2012-11-28T01:55:00.837",
"lastModified": "2012-11-28T05:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:49.710",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -79,6 +78,13 @@
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/281284",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4968",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-17T17:55:03.173",
"lastModified": "2012-09-18T04:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:49.847",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -198,6 +197,33 @@
"Exploit",
"Patch"
]
},
{
"url": "http://doc.silverstripe.org/framework/en/trunk/changelogs/2.3.13",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://doc.silverstripe.org/framework/en/trunk/changelogs/2.4.7",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/30/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/30/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/silverstripe/sapphire/commit/0085876",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
}
]
}

View File

@ -2,13 +2,8 @@
"id": "CVE-2012-4969",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-18T10:39:14.147",
"lastModified": "2017-11-21T18:13:03.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-06-08",
"cisaActionDue": "2022-06-22",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft Internet Explorer Use-After-Free Vulnerability",
"lastModified": "2024-11-21T01:43:49.980",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -27,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -46,6 +41,10 @@
}
]
},
"cisaExploitAdd": "2022-06-08",
"cisaActionDue": "2022-06-22",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft Internet Explorer Use-After-Free Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",
@ -461,6 +460,89 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://blog.vulnhunt.com/index.php/2012/09/17/ie-execcommand-fuction-use-after-free-vulnerability-0day_en/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ie_execcommand_uaf.rb",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://technet.microsoft.com/security/advisory/2757760",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/480095",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.securitytracker.com/id?1027538",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityweek.com/new-internet-explorer-zero-day-being-exploited-wild",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA12-255A.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA12-262A.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA12-265A.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15729",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4970",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-01-01T12:35:13.680",
"lastModified": "2013-03-26T03:39:17.753",
"lastModified": "2024-11-21T01:43:50.137",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -289,6 +288,18 @@
{
"url": "http://www.securitytracker.com/id?1027926",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0146.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://knowledgebase-iframe.polycom.com/kb/knowledgebase/End%20User/Tech%20Alerts/Video/15990_fHDX%20XSS%20Vulnerability%20-%20Security%20Bulletin%20101521.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1027926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4971",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-12T11:38:44.170",
"lastModified": "2012-12-12T11:38:44.170",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:50.280",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -78,6 +77,13 @@
"tags": [
"Exploit"
]
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-sql-injection.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4972",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-12T11:38:44.217",
"lastModified": "2017-08-29T01:32:26.477",
"lastModified": "2024-11-21T01:43:50.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -83,6 +82,18 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79658",
"source": "cve@mitre.org"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-embedded-xss.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-reflected-xss.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79658",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4974",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-12T11:38:44.263",
"lastModified": "2012-12-28T05:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:50.540",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -75,6 +74,10 @@
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-login-bypass.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-login-bypass.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4975",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-12T11:38:44.310",
"lastModified": "2017-08-29T01:32:26.527",
"lastModified": "2024-11-21T01:43:50.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -79,6 +78,14 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79644",
"source": "cve@mitre.org"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-auth-bypass.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79644",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4976",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-12T11:38:44.357",
"lastModified": "2012-12-12T11:38:44.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:50.783",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -75,6 +74,10 @@
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-creds-error-page.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-creds-error-page.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4977",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-12T11:38:44.403",
"lastModified": "2012-12-12T11:38:44.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:50.907",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -75,6 +74,10 @@
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-cleartext-login.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/helpbox-cleartext-login.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4982",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-05T11:57:15.210",
"lastModified": "2013-02-26T04:51:05.690",
"lastModified": "2024-11-21T01:43:51.353",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"baseScore": 5.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.8
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -79,6 +78,14 @@
{
"url": "http://www.securityfocus.com/bid/56687",
"source": "cve@mitre.org"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/forescout-cross-site-redirection.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/56687",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4983",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-05T11:57:15.240",
"lastModified": "2013-02-26T04:51:05.863",
"lastModified": "2024-11-21T01:43:51.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -79,6 +78,14 @@
{
"url": "http://www.securityfocus.com/bid/56688",
"source": "cve@mitre.org"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/forescout-nac-xss.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/56688",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4985",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-05T11:57:15.287",
"lastModified": "2017-08-29T01:32:26.637",
"lastModified": "2024-11-21T01:43:51.610",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -87,6 +86,22 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80284",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/87895",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/forescout-nac-icmp-arp.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/56689",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80284",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4987",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-11-04T15:55:01.357",
"lastModified": "2017-08-29T01:32:26.697",
"lastModified": "2024-11-21T01:43:51.750",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -95,6 +94,30 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79663",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/86721",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.org/files/117691/Realplayer-Watchfolders-Long-Filepath-Overflow.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://seclists.org/fulldisclosure/2012/Oct/189",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.reactionpenetrationtesting.co.uk/realplayer-watchfolders.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/56324",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79663",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4989",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-10-22T23:55:08.993",
"lastModified": "2017-08-29T01:32:26.837",
"lastModified": "2024-11-21T01:43:52.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -111,6 +110,46 @@
"tags": [
"Exploit"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0065.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://osvdb.org/86092",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/50877",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55860",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79196",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://svn.openx.org/openx/trunk/lib/templates/admin/plugin-group-view.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.htbridge.com/advisory/HTB23116",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4990",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-10-22T23:55:09.070",
"lastModified": "2017-08-29T01:32:26.900",
"lastModified": "2024-11-21T01:43:52.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -108,6 +107,43 @@
"tags": [
"Exploit"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0065.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://osvdb.org/86093",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/50877",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/55860",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79199",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://svn.openx.org/openx/trunk/www/admin/campaign-zone-link.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.htbridge.com/advisory/HTB23116",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4991",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-12-13T11:53:33.820",
"lastModified": "2012-12-13T11:53:33.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:52.333",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:N",
"baseScore": 8.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "NONE",
"baseScore": 8.5
"availabilityImpact": "NONE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
@ -76,6 +75,10 @@
{
"url": "http://www.exploit-db.com/exploits/23324/",
"source": "cve@mitre.org"
},
{
"url": "http://www.exploit-db.com/exploits/23324/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4992",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:07.327",
"lastModified": "2017-08-29T01:32:26.963",
"lastModified": "2024-11-21T01:43:52.463",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
@ -112,6 +111,47 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73626",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0002.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://osvdb.org/79767",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://seclists.org/fulldisclosure/2012/Mar/7",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.exploit-db.com/exploits/18555",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.flashfxp.com/forum/news/15473-flashfxp-4-2-released.html#post81101",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/52259",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vulnerability-lab.com/get_content.php?id=462",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73626",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4993",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:07.373",
"lastModified": "2012-09-21T04:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:52.603",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -79,6 +78,13 @@
"tags": [
"Exploit"
]
},
{
"url": "http://www.exploit-db.com/exploits/18553",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4994",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:07.483",
"lastModified": "2017-08-29T01:32:27.027",
"lastModified": "2024-11-21T01:43:52.737",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -168,6 +167,32 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73564",
"source": "cve@mitre.org"
},
{
"url": "http://freecode.com/projects/limesurvey/releases/342070",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://osvdb.org/79688",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/48184",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.limesurvey.org/en/stable-release",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73564",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4995",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:07.530",
"lastModified": "2017-08-29T01:32:27.120",
"lastModified": "2024-11-21T01:43:52.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -165,6 +164,29 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73563",
"source": "cve@mitre.org"
},
{
"url": "http://freecode.com/projects/limesurvey/releases/342070",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/79687",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/48184",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.limesurvey.org/en/stable-release",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73563",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4996",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:07.577",
"lastModified": "2017-08-29T01:32:27.180",
"lastModified": "2024-11-21T01:43:53.013",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -112,6 +111,36 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73679",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/48245",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/18553",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.osvdb.org/79805",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/79806",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/52283",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73679",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4997",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:07.607",
"lastModified": "2017-08-29T01:32:27.227",
"lastModified": "2024-11-21T01:43:53.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -94,6 +93,24 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73682",
"source": "cve@mitre.org"
},
{
"url": "http://www.exploit-db.com/exploits/18559",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/52272",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73682",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4998",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:08.577",
"lastModified": "2017-08-29T01:32:27.277",
"lastModified": "2024-11-21T01:43:53.293",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -93,6 +92,28 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73637",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/79739",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.org/files/110376/starcms-xss.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/52262",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73637",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-4999",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:08.607",
"lastModified": "2017-08-29T01:32:27.337",
"lastModified": "2024-11-21T01:43:53.430",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 6.1,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.5,
@ -108,6 +107,31 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73383",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0116.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/48079",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/52106",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73383",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5000",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:08.733",
"lastModified": "2017-08-29T01:32:27.400",
"lastModified": "2024-11-21T01:43:53.553",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -112,6 +111,35 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73681",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/48233",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/18558",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.osvdb.org/79807",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/52286",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73681",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5001",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:08.983",
"lastModified": "2017-08-29T01:32:27.447",
"lastModified": "2024-11-21T01:43:53.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -124,6 +123,33 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73545",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/79685",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/79686",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/48201",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-009/index.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/52205",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73545",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5002",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T19:55:09.233",
"lastModified": "2017-08-29T01:32:27.493",
"lastModified": "2024-11-21T01:43:53.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -105,6 +104,35 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73591",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/47912",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://security.inshell.net/advisory/5",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.osvdb.org/79691",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/52235",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73591",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5003",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T21:55:04.123",
"lastModified": "2017-08-29T01:32:27.557",
"lastModified": "2024-11-21T01:43:53.983",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -176,6 +175,25 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72712",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0161.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0466.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/47685",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72712",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5004",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T21:55:07.750",
"lastModified": "2017-08-29T01:32:27.603",
"lastModified": "2024-11-21T01:43:54.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -97,6 +96,32 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72628",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/78505",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.org/files/view/108972/VL-392.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/47556",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vulnerability-lab.com/get_content.php?id=392",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72628",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5005",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T21:55:08.797",
"lastModified": "2017-08-29T01:32:27.650",
"lastModified": "2024-11-21T01:43:54.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -89,6 +88,24 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72745",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/47729",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/18418",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72745",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5006",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-19T21:55:09.373",
"lastModified": "2012-09-20T04:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:54.397",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
@ -94,6 +93,28 @@
{
"url": "http://www.securityfocus.com/bid/51675",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/46091",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.caminova.com/en/downloads/download.aspx?id=1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.osvdb.org/78526",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/51675",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5007",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-20T03:46:36.490",
"lastModified": "2012-09-20T18:47:35.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:54.550",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -135,6 +134,33 @@
{
"url": "http://www.securityfocus.com/bid/51288",
"source": "cve@mitre.org"
},
{
"url": "http://drupal.org/node/1394428",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/78181",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/47418",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/07/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/51288",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5014",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-23T11:52:59.150",
"lastModified": "2014-04-23T15:18:42.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:54.837",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"baseScore": 6.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.3
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
@ -96,6 +95,10 @@
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5017",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-23T11:52:59.167",
"lastModified": "2021-10-05T14:51:27.070",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:54.940",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -123,6 +122,10 @@
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5032",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-23T11:52:59.167",
"lastModified": "2014-04-23T15:41:56.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:55.157",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"baseScore": 6.4,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -91,6 +90,10 @@
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5036",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-23T11:52:59.167",
"lastModified": "2014-04-23T16:31:27.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:55.263",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -100,6 +99,10 @@
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/release/notes/ol_20679.html",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/release/notes/ol_20679.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5037",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-23T11:52:59.180",
"lastModified": "2014-04-23T16:38:41.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:55.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"baseScore": 4.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
@ -93,6 +92,10 @@
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5039",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-23T11:52:59.180",
"lastModified": "2014-04-23T16:44:16.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T01:43:55.470",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -76,6 +75,10 @@
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/release/notes/ol_20679.html",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/release/notes/ol_20679.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,10 +2,8 @@
"id": "CVE-2012-5044",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-04-23T11:52:59.197",
"lastModified": "2014-04-23T16:52:45.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"evaluatorImpact": "Per: http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf\n\n\"This issue is seen with Cisco IOS Release 15.2(2)T\"",
"lastModified": "2024-11-21T01:43:55.573",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -24,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"baseScore": 5.4,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.4
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
@ -77,6 +75,11 @@
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
"source": "ykramarz@cisco.com"
},
{
"url": "http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
],
"evaluatorImpact": "Per: http://www.cisco.com/c/en/us/td/docs/ios/15_3m_and_t/release/notes/15_3m_and_t.pdf\n\n\"This issue is seen with Cisco IOS Release 15.2(2)T\""
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5048",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-28T10:40:22.507",
"lastModified": "2013-04-11T03:31:27.227",
"lastModified": "2024-11-21T01:43:55.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -100,6 +99,14 @@
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-271-02.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/55712",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-271-02.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5049",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-28T10:40:22.537",
"lastModified": "2013-04-11T03:31:27.293",
"lastModified": "2024-11-21T01:43:55.827",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
@ -103,6 +102,17 @@
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/55712",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-271-02.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2012-5050",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-10-05T17:55:00.847",
"lastModified": "2017-08-29T01:32:27.713",
"lastModified": "2024-11-21T01:43:55.963",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -109,6 +108,33 @@
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79044",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0069.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/85959",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/50795",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1027612",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0014.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79044",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

Some files were not shown because too many files have changed in this diff Show More