CVE-2012-0310
Published Jan 13, 2012
Last updated 7 years ago
Overview
- Description
- CRLF injection vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
- Source
- vultures@jpcert.or.jp
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cogentdatahub:cascade_datahub:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24329477-5153-4C83-A1D2-36DCB2D89285", "versionEndIncluding": "6.4.20" }, { "criteria": "cpe:2.3:a:cogentdatahub:cogent_datahub:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD844135-43CF-45C0-A483-A3F807F4B5A2", "versionEndIncluding": "7.1.2" }, { "criteria": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2DE7A08-D283-4EB3-BAAE-0BA4A8C2E088" }, { "criteria": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66059E64-6EB2-4F9D-BCB3-099A01C9E72A" }, { "criteria": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F05AAB16-437D-4A4E-892B-9B83E47FEC24" }, { "criteria": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65D16B36-567F-499D-AC7B-D2CC85AD9327" }, { "criteria": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8EC08FD-5473-4DB6-9828-8D007FE1E5FC" }, { "criteria": "cpe:2.3:a:cogentdatahub:opc_datahub:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51115EB4-98E2-45A2-80AB-8168292F9879", "versionEndIncluding": "6.4.20" } ], "operator": "OR" } ] } ]