var-201212-0248
Vulnerability from variot

Carlo Gavazzi EOS-Box with firmware before 1.0.0.1080_2.1.10 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by reading a password in a PHP script, a similar issue to CVE-2012-5862. Carlo Gavazzi EOS-Box is an embedded PC, and the CEOS-Box Photovoltaic Monitoring System is a photovoltaic monitoring system. EOS-Box is generally deployed in the renewable energy sector. Carlo Gavazzi EOS-BOX is prone to a security-bypass vulnerability because of hard coded passwords issue and an SQL-injection vulnerability. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions with administrative privileges, access or modify data, or exploit latent vulnerabilities in the underlying database. Carlo Gavazzi EOS-BOX versions prior to 1.0.0.1080_2.1.10 are vulnerable. ----------------------------------------------------------------------

The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/


TITLE: Carlo Gavazzi Eos-Box Hard-Coded Credentials and SQL Injection

SECUNIA ADVISORY ID: SA51641

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51641/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51641

RELEASE DATE: 2012-12-20

DISCUSS ADVISORY: http://secunia.com/advisories/51641/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/51641/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=51641

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A security issue and a vulnerability have been reported in Carlo Gavazzi Eos-Box, which can be exploited by malicious people conduct SQL injection attacks and compromise a vulnerable system.

2) Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

The security issue and the vulnerability are reported in firmware versions prior to 1.0.0.1080_2.1.10.

SOLUTION: Update to version 1.0.0.1080_2.1.10 (please contact the vendor for more information).

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-354-02.pdf

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201212-0248",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "eos-box photovoltaic monitoring system",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "carlosgavazzi",
        "version": "1.0.0"
      },
      {
        "model": "eos-box photovoltaic monitoring system",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "carlosgavazzi",
        "version": null
      },
      {
        "model": "eos-box",
        "scope": null,
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": null
      },
      {
        "model": "eos-box",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "carlo gavazzi",
        "version": "1.0.0.1080_2.1.10"
      },
      {
        "model": "gavazzi eos-box 1.0.0.1080 2.1.10",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "carlo",
        "version": null
      },
      {
        "model": "eos-box photovoltaic monitoring system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "carlosgavazzi",
        "version": "1.0.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6428"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:carlosgavazzi:eos-box_photovoltaic_monitoring_system",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:carlosgavazzi:eos-box_photovoltaic_monitoring_system_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported these issues.",
    "sources": [
      {
        "db": "BID",
        "id": "56989"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-6428",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2012-6428",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-59709",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-6428",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-6428",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201212-277",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-59709",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2012-6428",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-59709"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-6428"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6428"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Carlo Gavazzi EOS-Box with firmware before 1.0.0.1080_2.1.10 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by reading a password in a PHP script, a similar issue to CVE-2012-5862. Carlo Gavazzi EOS-Box is an embedded PC, and the CEOS-Box Photovoltaic Monitoring System is a photovoltaic monitoring system. EOS-Box is generally deployed in the renewable energy sector. Carlo Gavazzi EOS-BOX is prone to a security-bypass vulnerability because of  hard coded passwords issue and an SQL-injection vulnerability. \nAn attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions with administrative privileges, access or modify data, or exploit latent vulnerabilities in the underlying database. \nCarlo Gavazzi EOS-BOX versions prior to 1.0.0.1080_2.1.10 are vulnerable. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nCarlo Gavazzi Eos-Box Hard-Coded Credentials and SQL Injection\n\nSECUNIA ADVISORY ID:\nSA51641\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/51641/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=51641\n\nRELEASE DATE:\n2012-12-20\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/51641/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/51641/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=51641\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA security issue and a vulnerability have been reported in Carlo\nGavazzi Eos-Box, which can be exploited by malicious people conduct\nSQL injection attacks and compromise a vulnerable system. \n\n2) Certain unspecified input is not properly sanitised before being\nused in SQL queries. This can be exploited to manipulate SQL queries\nby injecting arbitrary SQL code. \n\nThe security issue and the vulnerability are reported in firmware\nversions prior to 1.0.0.1080_2.1.10. \n\nSOLUTION:\nUpdate to version 1.0.0.1080_2.1.10 (please contact the vendor for\nmore information). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nICS-CERT:\nhttp://www.us-cert.gov/control_systems/pdf/ICSA-12-354-02.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-6428"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "db": "BID",
        "id": "56989"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59709"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-6428"
      },
      {
        "db": "PACKETSTORM",
        "id": "118975"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ICS CERT",
        "id": "ICSA-12-354-02",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6428",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "56989",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "51641",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-277",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-59709",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-6428",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "118975",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59709"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-6428"
      },
      {
        "db": "BID",
        "id": "56989"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "db": "PACKETSTORM",
        "id": "118975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6428"
      }
    ]
  },
  "id": "VAR-201212-0248",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59709"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:02:30.802000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.productselection.net/"
      },
      {
        "title": "Carlo Gavazzi EOS-BOX administrator password to get a security bypass vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/26691"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-59709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6428"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.6,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-354-02.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6428"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6428"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/51641"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/56989"
      },
      {
        "trust": 0.3,
        "url": "http://www.gavazzi-automation.com/pressdescr.asp?id=87"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/255.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-12-354-02"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=51641"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/51641/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/51641/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/blog/325/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59709"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-6428"
      },
      {
        "db": "BID",
        "id": "56989"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "db": "PACKETSTORM",
        "id": "118975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6428"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59709"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-6428"
      },
      {
        "db": "BID",
        "id": "56989"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "db": "PACKETSTORM",
        "id": "118975"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6428"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-12-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "date": "2012-12-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-59709"
      },
      {
        "date": "2012-12-23T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-6428"
      },
      {
        "date": "2012-12-19T00:00:00",
        "db": "BID",
        "id": "56989"
      },
      {
        "date": "2012-12-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "date": "2012-12-21T08:02:03",
        "db": "PACKETSTORM",
        "id": "118975"
      },
      {
        "date": "2012-12-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      },
      {
        "date": "2012-12-23T21:55:01.653000",
        "db": "NVD",
        "id": "CVE-2012-6428"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-12-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-7568"
      },
      {
        "date": "2013-01-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-59709"
      },
      {
        "date": "2013-01-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-6428"
      },
      {
        "date": "2012-12-19T00:00:00",
        "db": "BID",
        "id": "56989"
      },
      {
        "date": "2012-12-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      },
      {
        "date": "2012-12-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      },
      {
        "date": "2024-11-21T01:46:06.240000",
        "db": "NVD",
        "id": "CVE-2012-6428"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Carlo Gavazzi EOS-Box Vulnerabilities in obtaining administrative access rights in firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-005791"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201212-277"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…