U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-0911

Change History

Modified Analysis by NIST 1/20/2024 9:50:35 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:3.2:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:3.3:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:3.4:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:3.5:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:4.1:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:4.2:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.3:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:6.1:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:6.2:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:7.2:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:8.1:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:8.2:*:*:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:* versions up to (including) 8.3
OR
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:lts:*:*:* versions up to (excluding) 6.7
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:-:*:*:* versions up to (excluding) 8.4
Removed CPE Configuration
OR
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:6.3:-:lts:*:*:*:*:*
     *cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:-:lts:*:*:*:*:* versions up to (including) 6.5

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-502
Removed CWE
NIST CWE-94

								
						
Changed Reference Type
http://dev.tiki.org/item4109 Patch, Vendor Advisory
http://dev.tiki.org/item4109 Broken Link
Changed Reference Type
http://info.tiki.org/article190-Tiki-Wiki-CMS-Groupware-Updates-Tiki-6-7-LTS Patch
http://info.tiki.org/article190-Tiki-Wiki-CMS-Groupware-Updates-Tiki-6-7-LTS Vendor Advisory
Changed Reference Type
http://info.tiki.org/article191-Tiki-Releases-8-4 Patch
http://info.tiki.org/article191-Tiki-Releases-8-4 Release Notes
Changed Reference Type
http://osvdb.org/83534 No Types Assigned
http://osvdb.org/83534 Broken Link
Changed Reference Type
http://www.exploit-db.com/exploits/19573 Exploit
http://www.exploit-db.com/exploits/19573 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.exploit-db.com/exploits/19630 Exploit
http://www.exploit-db.com/exploits/19630 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/54298 Exploit
http://www.securityfocus.com/bid/54298 Broken Link
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/76758 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/76758 Third Party Advisory, VDB Entry