mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-30 11:34:33 +00:00
126 lines
4.1 KiB
JSON
126 lines
4.1 KiB
JSON
{
|
|
"id": "CVE-2012-1815",
|
|
"sourceIdentifier": "cret@cert.org",
|
|
"published": "2012-06-08T18:55:01.567",
|
|
"lastModified": "2012-10-30T04:03:16.830",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "SQL injection vulnerability in Emerson DeltaV and DeltaV Workstations 9.3.1, 10.3.1, 11.3, and 11.3.1 and DeltaV ProEssentials Scientific Graph 5.0.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Emerson DeltaV y DeltaV Workstations v9.3.1, v10.3.1, v11.3, y v11.3.1 y DeltaV ProEssentials Scientific Graph v5.0.0.6, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de vectores no especificadas."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav:9.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A47A4CF-7DC2-40BF-8665-261C17A4159B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav:10.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E005DD9A-07FB-4DE2-810B-372E62A091B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav:11.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0123046-D89E-4FBB-9176-C04E0C65E9AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav:11.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "943B3480-56C4-4131-BE8F-62FE035D4619"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav_proessentials_scientific_graph:5.0.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "75620876-5526-451E-8284-3CB1BF16642F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav_workstation:9.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B41EAEE-53EC-4EF0-BB63-58772E4D6278"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav_workstation:10.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE35A6AE-616B-4254-83B6-50726498B765"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav_workstation:11.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E5C9C34A-FE86-4B79-BC2F-14B7F6320A8D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:emerson:deltav_workstation:11.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A164A098-9568-476F-BE49-D847378A7BE9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/53591",
|
|
"source": "cret@cert.org"
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-138-01.pdf",
|
|
"source": "cret@cert.org",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
}
|
|
]
|
|
} |