U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-2962

Change History

Modified Analysis by NIST 3/12/2018 1:21:25 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:dell:sonicwall_scrutinizer:8.6.2:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer:8.6.2:-:free:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer:9.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer:9.0.0:-:free:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer:9.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer:9.0.1:-:free:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer:*:*:*:*:*:*:*:* versions up to (including) 9.5.0
     *cpe:2.3:a:dell:sonicwall_scrutinizer:*:-:free:*:*:*:*:* versions up to (including) 9.5.0
     *cpe:2.3:a:dell:sonicwall_scrutinizer_with_flow_analytics_module:8.6.2:-:pay:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer_with_flow_analytics_module:9.0.0:-:pay:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer_with_flow_analytics_module:9.0.1:-:pay:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_scrutinizer_with_flow_analytics_module:*:-:pay:*:*:*:*:* versions up to (including) 9.5.0
OR
     *cpe:2.3:a:sonicwall:scrutinizer:*:*:*:*:*:*:*:* versions up to (excluding) 9.5.2
Changed Reference Type
http://secunia.com/advisories/50052 Vendor Advisory
http://secunia.com/advisories/50052 Third Party Advisory
Changed Reference Type
http://www.exploit-db.com/exploits/20033 Exploit
http://www.exploit-db.com/exploits/20033 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.kb.cert.org/vuls/id/404051 US Government Resource
http://www.kb.cert.org/vuls/id/404051 Third Party Advisory, US Government Resource
Changed Reference Type
http://www.osvdb.org/84232 No Types Assigned
http://www.osvdb.org/84232 Broken Link
Changed Reference Type
http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html No Types Assigned
http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/54625 Exploit
http://www.securityfocus.com/bid/54625 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.sonicwall.com/shared/download/Dell_SonicWALL_Scrutinizer_Service_Bulletin_for_SQL_injection_vulnerability_CVE.pdf Vendor Advisory
http://www.sonicwall.com/shared/download/Dell_SonicWALL_Scrutinizer_Service_Bulletin_for_SQL_injection_vulnerability_CVE.pdf Broken Link, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/77148 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/77148 Third Party Advisory, VDB Entry