Search criteria

15 vulnerabilities found for scalar_i500_firmware by quantum

FKIE_CVE-2014-2959

Vulnerability from fkie_nvd - Published: 2014-06-02 19:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:dell:powervault_ml6000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DFB91B9-A601-4F22-A1D2-D9DD5C8F9385",
              "versionEndIncluding": "i8.2.0.1_\\(641g.gs003\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C9AB1-37AE-43EE-BAAC-39277789B734",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A96FD1-2005-41BE-ACE5-33AC136F7206",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E26485A-B28F-42DF-8650-59A7D7C9D554",
              "versionEndIncluding": "i8.2.2.1_\\(646g.gs002\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AA8B64-A78C-4B51-B29B-21CF2AEF9484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FFB7DA-15EB-4053-9440-A30F8E434F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39DFB77-7945-4CA0-9B66-AF3908FE515D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter."
    },
    {
      "lang": "es",
      "value": "logViewer.htm en el sistema de copias de seguridad de cintas Dell ML6000 con firmware anterior a i8.2.0.2 (641G.GS103) y el sistema de copias de seguridad de cintas Quantum Scalar i500 con firmware anterior a i8.2.2.1 (646G.GS002) permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres de shell en un par\u00e1metro de nombre de ruta."
    }
  ],
  "id": "CVE-2014-2959",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 8.5,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-06-02T19:55:03.500",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/59019"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/124908"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/67751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59019"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/124908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/67751"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-1842

Vulnerability from fkie_nvd - Published: 2012-03-22 10:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "285AA3DB-D702-4F55-A6B6-99F6BC12B1DF",
              "versionEndIncluding": "i7.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE92B3E-2606-4309-9462-E0529A967AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8B4BB2-1E77-4980-BFD2-3030703C27C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF16C0F-1D0B-45DB-BDBE-3400DEC20B9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADF92E7-1E86-432F-990A-D2B032329C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*",
              "matchCriteriaId": "85452B6E-BD5E-436B-BC5C-F91F68FD19A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB27B5B-0E14-4866-88FF-83BA652E6CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*",
              "matchCriteriaId": "94298513-64B2-40F5-AA01-27F5620217B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FB8F97-28EE-42D3-B793-6E7F36B15234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*",
              "matchCriteriaId": "466D3BD8-0B2A-4DE6-BD23-118CF7AD3413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D2BEA7-216D-4202-8BE2-430CCCAD106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CA3AC1-4AC5-48BA-B749-CF29104093DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE34EB9-66D2-498D-A02D-7F5EAD923707",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AA8B64-A78C-4B51-B29B-21CF2AEF9484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FFB7DA-15EB-4053-9440-A30F8E434F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39DFB77-7945-4CA0-9B66-AF3908FE515D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*",
              "matchCriteriaId": "B993C619-EC72-47F2-AAE0-8EED9AAC7BF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C9AB1-37AE-43EE-BAAC-39277789B734",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A96FD1-2005-41BE-ACE5-33AC136F7206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0FF827-E40B-4DC0-9CAC-82922B827F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "789D5925-AF4A-4CBA-B51F-FF6F1ADE5C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93C93C2-3FC1-4E5A-AC82-22EAFAA5B4CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en checkQKMProg.htm en la biblioteca de cintas Quantum Scalar i500 con el firmware anterior a i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la biblioteca de cintas Dell ML6000 con el firmware anterior a A20-00 (590G.GS00100), permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-1842",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-03-22T10:17:11.050",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80225"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80239"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/48403"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/48453"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48453"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "An authentication is required to exploit this issue. The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.",
      "lastModified": "2012-06-13T00:00:00",
      "organization": "Quantum Corporation"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-1844

Vulnerability from fkie_nvd - Published: 2012-03-22 10:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "285AA3DB-D702-4F55-A6B6-99F6BC12B1DF",
              "versionEndIncluding": "i7.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE92B3E-2606-4309-9462-E0529A967AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8B4BB2-1E77-4980-BFD2-3030703C27C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF16C0F-1D0B-45DB-BDBE-3400DEC20B9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADF92E7-1E86-432F-990A-D2B032329C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*",
              "matchCriteriaId": "85452B6E-BD5E-436B-BC5C-F91F68FD19A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB27B5B-0E14-4866-88FF-83BA652E6CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*",
              "matchCriteriaId": "94298513-64B2-40F5-AA01-27F5620217B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FB8F97-28EE-42D3-B793-6E7F36B15234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*",
              "matchCriteriaId": "466D3BD8-0B2A-4DE6-BD23-118CF7AD3413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D2BEA7-216D-4202-8BE2-430CCCAD106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CA3AC1-4AC5-48BA-B749-CF29104093DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE34EB9-66D2-498D-A02D-7F5EAD923707",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AA8B64-A78C-4B51-B29B-21CF2AEF9484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FFB7DA-15EB-4053-9440-A30F8E434F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39DFB77-7945-4CA0-9B66-AF3908FE515D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*",
              "matchCriteriaId": "B993C619-EC72-47F2-AAE0-8EED9AAC7BF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C9AB1-37AE-43EE-BAAC-39277789B734",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A96FD1-2005-41BE-ACE5-33AC136F7206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0FF827-E40B-4DC0-9CAC-82922B827F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "789D5925-AF4A-4CBA-B51F-FF6F1ADE5C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93C93C2-3FC1-4E5A-AC82-22EAFAA5B4CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:ts3310_tape_library_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D9D062-754E-49D8-94D9-81E15511A5D2",
              "versionEndIncluding": "605g.g002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ibm:ts3310_tape_library:3573:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC7FE3B-2E91-4A09-9C41-7F0CB198B0E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:ibm:ts3310_tape_library:3576:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE63555B-ADBE-45DA-9D98-22445A11FCA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
    },
    {
      "lang": "es",
      "value": "La librer\u00eda de cintas Quantum Scalar i500 con el firmware antes de i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la librer\u00eda de cintas Dell ML6000 con el firmware antes de A20-00 (590G.GS00100) y como la librer\u00eda de cintas IBM TS3310 con el firmware antes de R6C (606G. GS001), utiliza contrase\u00f1as por defecto para las cuentas de usuario no especificados, lo cual facilita a los atacantes remotos a la hora de obtener acceso a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-1844",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-22T10:17:11.127",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80372"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.",
      "lastModified": "2012-06-13T00:00:00",
      "organization": "Quantum Corporation"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-1843

Vulnerability from fkie_nvd - Published: 2012-03-22 10:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a "command-injection vulnerability."

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "285AA3DB-D702-4F55-A6B6-99F6BC12B1DF",
              "versionEndIncluding": "i7.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE92B3E-2606-4309-9462-E0529A967AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8B4BB2-1E77-4980-BFD2-3030703C27C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF16C0F-1D0B-45DB-BDBE-3400DEC20B9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADF92E7-1E86-432F-990A-D2B032329C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*",
              "matchCriteriaId": "85452B6E-BD5E-436B-BC5C-F91F68FD19A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB27B5B-0E14-4866-88FF-83BA652E6CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*",
              "matchCriteriaId": "94298513-64B2-40F5-AA01-27F5620217B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FB8F97-28EE-42D3-B793-6E7F36B15234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*",
              "matchCriteriaId": "466D3BD8-0B2A-4DE6-BD23-118CF7AD3413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D2BEA7-216D-4202-8BE2-430CCCAD106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CA3AC1-4AC5-48BA-B749-CF29104093DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE34EB9-66D2-498D-A02D-7F5EAD923707",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AA8B64-A78C-4B51-B29B-21CF2AEF9484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FFB7DA-15EB-4053-9440-A30F8E434F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39DFB77-7945-4CA0-9B66-AF3908FE515D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*",
              "matchCriteriaId": "B993C619-EC72-47F2-AAE0-8EED9AAC7BF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C9AB1-37AE-43EE-BAAC-39277789B734",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A96FD1-2005-41BE-ACE5-33AC136F7206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0FF827-E40B-4DC0-9CAC-82922B827F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "789D5925-AF4A-4CBA-B51F-FF6F1ADE5C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93C93C2-3FC1-4E5A-AC82-22EAFAA5B4CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a \"command-injection vulnerability.\""
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de falsificaci\u00f3n de peticiones en sitios cruzados (CSRF) en saveRestore.htm en la librer\u00eda de cintas Quantum Scalar i500 con el firmware anterior a i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la librer\u00eda de cintas Dell ML6000 con el firmware anterior a A20-00 (590G.GS00100 ), permite a atacantes remotos secuestrar la autenticaci\u00f3n de los usuarios para las solicitudes que ejecutan comandos de Linux a trav\u00e9s del par\u00e1metro fileName. Esta vulnerabilidad esta relacionada con una vulnerabilidad de \"inyecci\u00f3n de comandos\"."
    }
  ],
  "id": "CVE-2012-1843",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-03-22T10:17:11.097",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80227"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/48403"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/48453"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48453"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "An authentication is required to exploit this issue. The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.",
      "lastModified": "2012-06-13T00:00:00",
      "organization": "Quantum Corporation"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-1841

Vulnerability from fkie_nvd - Published: 2012-03-22 10:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "285AA3DB-D702-4F55-A6B6-99F6BC12B1DF",
              "versionEndIncluding": "i7.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE92B3E-2606-4309-9462-E0529A967AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8B4BB2-1E77-4980-BFD2-3030703C27C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF16C0F-1D0B-45DB-BDBE-3400DEC20B9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADF92E7-1E86-432F-990A-D2B032329C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5:*:*:*:*:*:*:*",
              "matchCriteriaId": "85452B6E-BD5E-436B-BC5C-F91F68FD19A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB27B5B-0E14-4866-88FF-83BA652E6CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6:*:*:*:*:*:*:*",
              "matchCriteriaId": "94298513-64B2-40F5-AA01-27F5620217B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FB8F97-28EE-42D3-B793-6E7F36B15234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7:*:*:*:*:*:*:*",
              "matchCriteriaId": "466D3BD8-0B2A-4DE6-BD23-118CF7AD3413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:i7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D2BEA7-216D-4202-8BE2-430CCCAD106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "68CA3AC1-4AC5-48BA-B749-CF29104093DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quantum:scalar_i500_firmware:sp4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE34EB9-66D2-498D-A02D-7F5EAD923707",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6AA8B64-A78C-4B51-B29B-21CF2AEF9484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FFB7DA-15EB-4053-9440-A30F8E434F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:quantum:scalar_i500:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39DFB77-7945-4CA0-9B66-AF3908FE515D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dell:powervault_ml6000_firmware:585g.gs003:*:*:*:*:*:*:*",
              "matchCriteriaId": "B993C619-EC72-47F2-AAE0-8EED9AAC7BF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:32u:*:*:*:*:*:*:*",
              "matchCriteriaId": "136C9AB1-37AE-43EE-BAAC-39277789B734",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6000:41u:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A96FD1-2005-41BE-ACE5-33AC136F7206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6010:5u:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0FF827-E40B-4DC0-9CAC-82922B827F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6020:14u:*:*:*:*:*:*:*",
              "matchCriteriaId": "789D5925-AF4A-4CBA-B51F-FF6F1ADE5C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:dell:powervault_ml6030:23u:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93C93C2-3FC1-4E5A-AC82-22EAFAA5B4CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de salto de directorio absoluto en logShow.htm en la biblioteca de cinta Quantum Scalar i500 con el firmware anterior a i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la biblioteca de cintas Dell ML6000 con el firmware anterior a A20-00 (590G.GS00100), permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de una ruta completa en el par\u00e1metro file."
    }
  ],
  "id": "CVE-2012-1841",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-22T10:17:11.003",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80226"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/48403"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/48453"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48453"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/913483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue.  An official firmware release that fixes the vulnerability is also available for all existing customers.  The customer data stored on tape cannot be exploited by this vulnerability.",
      "lastModified": "2012-06-13T00:00:00",
      "organization": "Quantum Corporation"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-2959 (GCVE-0-2014-2959)

Vulnerability from cvelistv5 – Published: 2014-06-02 19:00 – Updated: 2024-08-06 10:28
VLAI?
Summary
logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/67751 vdb-entryx_refsource_BID
http://www.kb.cert.org/vuls/id/124908 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/59019 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:28:46.358Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "67751",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67751"
          },
          {
            "name": "VU#124908",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/124908"
          },
          {
            "name": "59019",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59019"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-20T12:57:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "67751",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67751"
        },
        {
          "name": "VU#124908",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/124908"
        },
        {
          "name": "59019",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59019"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2014-2959",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "67751",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67751"
            },
            {
              "name": "VU#124908",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/124908"
            },
            {
              "name": "59019",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59019"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2014-2959",
    "datePublished": "2014-06-02T19:00:00",
    "dateReserved": "2014-04-21T00:00:00",
    "dateUpdated": "2024-08-06T10:28:46.358Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1844 (GCVE-0-2012-1844)

Vulnerability from cvelistv5 – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "scalar-default-account(74322)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80372",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80372"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "scalar-default-account(74322)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80372",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80372"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1844",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "scalar-default-account(74322)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80372",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80372"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1844",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.646Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1843 (GCVE-0-2012-1843)

Vulnerability from cvelistv5 – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a "command-injection vulnerability."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/48453 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/913483 third-party-advisoryx_refsource_CERT-VN
http://osvdb.org/80227 vdb-entryx_refsource_OSVDB
http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.kb.cert.org/vuls/id/MAPG-8NVRPY x_refsource_MISC
http://secunia.com/advisories/48403 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.704Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "48453",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48453"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "name": "80227",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80227"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "name": "scalar-unspec-csrf(74161)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "48403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48403"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a \"command-injection vulnerability.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "48453",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48453"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "name": "80227",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80227"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "name": "scalar-unspec-csrf(74161)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "48403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48403"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1843",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a \"command-injection vulnerability.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "48453",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48453"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "80227",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80227"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "scalar-unspec-csrf(74161)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "48403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48403"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1843",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.704Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1842 (GCVE-0-2012-1842)

Vulnerability from cvelistv5 – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/48453 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/913483 third-party-advisoryx_refsource_CERT-VN
http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 x_refsource_MISC
http://www.kb.cert.org/vuls/id/MAPG-8NVRPY x_refsource_MISC
http://osvdb.org/80239 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/48403 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/80225 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.508Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "48453",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48453"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80239",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80239"
          },
          {
            "name": "48403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48403"
          },
          {
            "name": "80225",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80225"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "48453",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48453"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80239",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80239"
        },
        {
          "name": "48403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48403"
        },
        {
          "name": "80225",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80225"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1842",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "48453",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48453"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80239",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80239"
            },
            {
              "name": "48403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48403"
            },
            {
              "name": "80225",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80225"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1842",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.508Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1841 (GCVE-0-2012-1841)

Vulnerability from cvelistv5 – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/48453 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/913483 third-party-advisoryx_refsource_CERT-VN
http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 x_refsource_MISC
http://www.kb.cert.org/vuls/id/MAPG-8NVRPY x_refsource_MISC
http://osvdb.org/80226 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/48403 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.517Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "48453",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48453"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80226",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80226"
          },
          {
            "name": "48403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48403"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "48453",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48453"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80226",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80226"
        },
        {
          "name": "48403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48403"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1841",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "48453",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48453"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80226",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80226"
            },
            {
              "name": "48403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48403"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1841",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2959 (GCVE-0-2014-2959)

Vulnerability from nvd – Published: 2014-06-02 19:00 – Updated: 2024-08-06 10:28
VLAI?
Summary
logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/67751 vdb-entryx_refsource_BID
http://www.kb.cert.org/vuls/id/124908 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/59019 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:28:46.358Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "67751",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67751"
          },
          {
            "name": "VU#124908",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/124908"
          },
          {
            "name": "59019",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59019"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-20T12:57:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "67751",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67751"
        },
        {
          "name": "VU#124908",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/124908"
        },
        {
          "name": "59019",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59019"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2014-2959",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "logViewer.htm on the Dell ML6000 tape backup system with firmware before i8.2.0.2 (641G.GS103) and the Quantum Scalar i500 tape backup system with firmware before i8.2.2.1 (646G.GS002) allows remote attackers to execute arbitrary commands via shell metacharacters in a pathname parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "67751",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67751"
            },
            {
              "name": "VU#124908",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/124908"
            },
            {
              "name": "59019",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59019"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2014-2959",
    "datePublished": "2014-06-02T19:00:00",
    "dateReserved": "2014-04-21T00:00:00",
    "dateUpdated": "2024-08-06T10:28:46.358Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1844 (GCVE-0-2012-1844)

Vulnerability from nvd – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "scalar-default-account(74322)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80372",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80372"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "scalar-default-account(74322)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80372",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80372"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1844",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "scalar-default-account(74322)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80372",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80372"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1844",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.646Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1843 (GCVE-0-2012-1843)

Vulnerability from nvd – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a "command-injection vulnerability."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/48453 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/913483 third-party-advisoryx_refsource_CERT-VN
http://osvdb.org/80227 vdb-entryx_refsource_OSVDB
http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.kb.cert.org/vuls/id/MAPG-8NVRPY x_refsource_MISC
http://secunia.com/advisories/48403 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.704Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "48453",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48453"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "name": "80227",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80227"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "name": "scalar-unspec-csrf(74161)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "48403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48403"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a \"command-injection vulnerability.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "48453",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48453"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "name": "80227",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80227"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "name": "scalar-unspec-csrf(74161)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "48403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48403"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1843",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a \"command-injection vulnerability.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "48453",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48453"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "80227",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80227"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "scalar-unspec-csrf(74161)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "48403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48403"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1843",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.704Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1842 (GCVE-0-2012-1842)

Vulnerability from nvd – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/48453 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/913483 third-party-advisoryx_refsource_CERT-VN
http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 x_refsource_MISC
http://www.kb.cert.org/vuls/id/MAPG-8NVRPY x_refsource_MISC
http://osvdb.org/80239 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/48403 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/80225 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.508Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "48453",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48453"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80239",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80239"
          },
          {
            "name": "48403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48403"
          },
          {
            "name": "80225",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80225"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "48453",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48453"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80239",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80239"
        },
        {
          "name": "48403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48403"
        },
        {
          "name": "80225",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80225"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1842",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "48453",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48453"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80239",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80239"
            },
            {
              "name": "48403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48403"
            },
            {
              "name": "80225",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80225"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1842",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.508Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1841 (GCVE-0-2012-1841)

Vulnerability from nvd – Published: 2012-03-22 10:00 – Updated: 2024-08-06 19:08
VLAI?
Summary
Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/48453 third-party-advisoryx_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/913483 third-party-advisoryx_refsource_CERT-VN
http://www.kb.cert.org/vuls/id/MAPG-8NNKN8 x_refsource_MISC
http://www.kb.cert.org/vuls/id/MAPG-8NVRPY x_refsource_MISC
http://osvdb.org/80226 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/48403 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.517Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "48453",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48453"
          },
          {
            "name": "VU#913483",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/913483"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
          },
          {
            "name": "80226",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80226"
          },
          {
            "name": "48403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48403"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "48453",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48453"
        },
        {
          "name": "VU#913483",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/913483"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
        },
        {
          "name": "80226",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80226"
        },
        {
          "name": "48403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48403"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1841",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "48453",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48453"
            },
            {
              "name": "VU#913483",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/913483"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8"
            },
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY",
              "refsource": "MISC",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY"
            },
            {
              "name": "80226",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80226"
            },
            {
              "name": "48403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48403"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1841",
    "datePublished": "2012-03-22T10:00:00",
    "dateReserved": "2012-03-21T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}