CVE-2012-5978
 
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple directory traversal vulnerabilities in the (1) View Connection Server and (2) View Security Server in VMware View 4.x before 4.6.2 and 5.x before 5.1.2 allow remote attackers to read arbitrary files via unspecified vectors.
Múltiples vulnerabilidades de salto de directorio en (1) View Connection Server y (2) View Security Server en VMware View v4.x antes de v4.6.2 y v5.x antes de v5.1.2 permiten a atacantes remotos leer archivos de su elección a través de vectores no especificados.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2012-11-21 CVE Reserved
- 2012-12-15 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securitytracker.com/id?1027875 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17049 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.vmware.com/security/advisories/VMSA-2012-0017.html | 2017-09-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 4.0.0 Search vendor "Vmware" for product "View" and version "4.0.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 4.0.0 Search vendor "Vmware" for product "View" and version "4.0.0" | u2 |
Affected
| ||||||
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 4.5 Search vendor "Vmware" for product "View" and version "4.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 4.6.0 Search vendor "Vmware" for product "View" and version "4.6.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 4.6.1 Search vendor "Vmware" for product "View" and version "4.6.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 5.0.0 Search vendor "Vmware" for product "View" and version "5.0.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 5.0.0 Search vendor "Vmware" for product "View" and version "5.0.0" | u2 |
Affected
| ||||||
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 5.0.1 Search vendor "Vmware" for product "View" and version "5.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | View Search vendor "Vmware" for product "View" | 5.1.0 Search vendor "Vmware" for product "View" and version "5.1.0" | - |
Affected
|