U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-6277

Change History

Initial Analysis by NIST 3/04/2020 3:18:25 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:hp:autonomy_keyview_idol:*:*:*:*:*:*:*:* versions up to (excluding) 10.16
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:ibm:domino:*:*:*:*:*:*:*:* versions from (including) 8.5.0 up to (including) 8.5.3.6
     *cpe:2.3:a:ibm:notes:*:*:*:*:*:*:*:* versions from (including) 8.5 up to (including) 8.5.3
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:symantec:data_loss_prevention_endpoint:*:*:*:*:*:*:*:* versions from (including) 11.0 up to (excluding) 11.6.1
     *cpe:2.3:a:symantec:data_loss_prevention_enforce\/detection_servers:*:*:*:*:*:linux:*:* versions from (including) 11.0 up to (excluding) 11.6.1
     *cpe:2.3:a:symantec:data_loss_prevention_enforce\/detection_servers:*:*:*:*:*:windows:*:* versions from (including) 11.0 up to (excluding) 11.6.1
     *cpe:2.3:a:symantec:mail_security:6.5.7:*:*:*:*:*:*:*
     *cpe:2.3:a:symantec:mail_security:*:*:*:*:*:microsoft_exchange:*:* versions up to (including) 6.5.7
     *cpe:2.3:a:symantec:mail_security:*:*:*:*:*:domino:*:* versions up to (including) 8.1.0
     *cpe:2.3:a:symantec:messaging_gateway:*:*:*:*:*:*:*:* versions from (including) 9.5 up to (excluding) 10.0.1
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Added CVSS V2 Metadata

								
							
							
						
Victim must voluntarily interact with attack mechanism
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Changed Reference Type
https://support.symantec.com/us/en/article.symsa1262.html No Types Assigned
https://support.symantec.com/us/en/article.symsa1262.html Vendor Advisory
Changed Reference Type
https://tools.cisco.com/security/center/viewAlert.x?alertId=27482 No Types Assigned
https://tools.cisco.com/security/center/viewAlert.x?alertId=27482 Third Party Advisory
Changed Reference Type
https://vulmon.com/vulnerabilitydetails?qid=CVE-2012-6277 No Types Assigned
https://vulmon.com/vulnerabilitydetails?qid=CVE-2012-6277 Third Party Advisory
Changed Reference Type
https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities No Types Assigned
https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities Third Party Advisory, US Government Resource
Changed Reference Type
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/ No Types Assigned
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/ Vendor Advisory
Changed Reference Type
https://www.kb.cert.org/vuls/id/849841/ No Types Assigned
https://www.kb.cert.org/vuls/id/849841/ Third Party Advisory, US Government Resource
Changed Reference Type
https://www.securityfocus.com/bid/56610 No Types Assigned
https://www.securityfocus.com/bid/56610 Third Party Advisory, VDB Entry
Changed Reference Type
https://www.tenable.com/plugins/nessus/67192 No Types Assigned
https://www.tenable.com/plugins/nessus/67192 Third Party Advisory