Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2012-01-02T00:00:00", "descriptions": [{"lang": "en", "value": "monitor/index.php in op5 Monitor and op5 Appliance before 5.5.1 allows remote authenticated users to obtain sensitive information such as database and user credentials via error messages that are triggered by (1) a malformed hoststatustypes parameter to status/service/all or (2) a crafted request to config."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2014-01-29T17:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "78067", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://www.osvdb.org/78067"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://bugs.op5.com/view.php?id=5094"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/"}, {"name": "47344", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/47344"}, {"name": "20120107 OP5 Monitor - Multiple Vulnerabilities", "tags": ["mailing-list", "x_refsource_FULLDISC"], "url": "http://seclists.org/fulldisclosure/2012/Jan/62"}, {"tags": ["x_refsource_MISC"], "url": "http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0263", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "monitor/index.php in op5 Monitor and op5 Appliance before 5.5.1 allows remote authenticated users to obtain sensitive information such as database and user credentials via error messages that are triggered by (1) a malformed hoststatustypes parameter to status/service/all or (2) a crafted request to config."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "78067", "refsource": "OSVDB", "url": "http://www.osvdb.org/78067"}, {"name": "https://bugs.op5.com/view.php?id=5094", "refsource": "CONFIRM", "url": "https://bugs.op5.com/view.php?id=5094"}, {"name": "http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/", "refsource": "CONFIRM", "url": "http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/"}, {"name": "47344", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47344"}, {"name": "20120107 OP5 Monitor - Multiple Vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2012/Jan/62"}, {"name": "http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf", "refsource": "MISC", "url": "http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-06T18:16:20.085Z"}, "title": "CVE Program Container", "references": [{"name": "78067", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://www.osvdb.org/78067"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://bugs.op5.com/view.php?id=5094"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/"}, {"name": "47344", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/47344"}, {"name": "20120107 OP5 Monitor - Multiple Vulnerabilities", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"], "url": "http://seclists.org/fulldisclosure/2012/Jan/62"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0263", "datePublished": "2013-12-31T20:00:00", "dateReserved": "2011-12-21T00:00:00", "dateUpdated": "2024-08-06T18:16:20.085Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}