U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-0158

Change History

Modified Analysis by NIST 7/24/2024 1:07:11 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:biztalk_server:2002:sp1:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:commerce_server:2002:sp4:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:commerce_server:2007:sp2:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:commerce_server:2009:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:commerce_server:2009:r2:*:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:biztalk_server:2002:sp1:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:commerce_server:2002:sp4:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:commerce_server:2007:sp2:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:commerce_server_2009:-:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:commerce_server_2009:r2:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:office:2010:*:x86:*:*:*:*:*
     *cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*
     *cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:office:2010:*:*:*:*:*:x86:*
     *cpe:2.3:a:microsoft:office:2010:sp1:*:*:*:*:x86:*
     *cpe:2.3:a:microsoft:office_web_components:2003:sp3:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:sql_server:2000:sp4:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2000:sp4:analysis_services:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2005:sp4:express_advanced_services:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2005:sp4:itanium:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2005:sp4:x64:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2005:sp4:x86:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:r2:itanium:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:r2:x64:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:r2:x86:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:sp2:itanium:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:sp2:x64:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:sp2:x86:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:sp3:itanium:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:sp3:x64:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server:2008:sp3:x86:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:sql_server_2000:-:sp4:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server_2005:-:sp4:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server_2008:-:sp2:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server_2008:-:sp3:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server_2008:r2:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:sql_server_2008:r2:sp1:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:visual_basic:6.0:*:runtime_extended_files:*:*:*:*:*
     *cpe:2.3:a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:visual_basic:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:*
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Changed Reference Type
http://opensources.info/comment-on-the-curious-case-of-a-cve-2012-0158-exploit-by-chris-pierce/ No Types Assigned
http://opensources.info/comment-on-the-curious-case-of-a-cve-2012-0158-exploit-by-chris-pierce/ Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/52911 No Types Assigned
http://www.securityfocus.com/bid/52911 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1026899 No Types Assigned
http://www.securitytracker.com/id?1026899 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1026900 No Types Assigned
http://www.securitytracker.com/id?1026900 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1026902 No Types Assigned
http://www.securitytracker.com/id?1026902 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1026903 No Types Assigned
http://www.securitytracker.com/id?1026903 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1026904 No Types Assigned
http://www.securitytracker.com/id?1026904 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1026905 No Types Assigned
http://www.securitytracker.com/id?1026905 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA12-101A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA12-101A.html Third Party Advisory, US Government Resource
Changed Reference Type
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-027 No Types Assigned
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-027 Patch, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/74372 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/74372 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15462 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15462 Broken Link