U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-4528

Change History

Modified Analysis by NIST 2/12/2021 12:29:16 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:trustwave:modsecurity:2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.5:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.6:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.2:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.3:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.4:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.5:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.6:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.7:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.8:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.9:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.10:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.11:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.12:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.13:dev1:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.0:rc1:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.1:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.1:rc1:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.2:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.2:rc1:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.3:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.3:rc1:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.4:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.4:rc1:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.5:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.7:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.6.8:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:*:rc3:*:*:*:*:*:* versions up to (including) 2.7.0
OR
     *cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:* versions up to (excluding) 2.7.0
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Removed CWE
NIST CWE-264

								
						
Changed Reference Type
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html No Types Assigned
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html No Types Assigned
http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html No Types Assigned
http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html No Types Assigned
http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html Mailing List, Third Party Advisory
Changed Reference Type
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES No Types Assigned
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES Broken Link
Changed Reference Type
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081 Patch
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081 Broken Link
Changed Reference Type
http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081 No Types Assigned
http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081 Broken Link
Changed Reference Type
http://seclists.org/fulldisclosure/2012/Oct/113 Exploit
http://seclists.org/fulldisclosure/2012/Oct/113 Exploit, Mailing List, Third Party Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2012/10/18/14 No Types Assigned
http://www.openwall.com/lists/oss-security/2012/10/18/14 Mailing List, Third Party Advisory
Changed Reference Type
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt No Types Assigned
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt Third Party Advisory