Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2012-1063
Multiple SQL injection vulnerabilities in ManageEngine Applications Manager 9.x and 10.x allow remote attackers to execute arbitrary SQL commands via the (1) viewId parameter to fault/AlarmView.do or (2) period parameter to showHistoryData.do.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.004
EPSS Ranking
60.0%
CVSS Severity
CVSS v2 Score
7.5
References
http://packetstormsecurity.org/files/view/109238/VL-115.txt
http://www.securityfocus.com/bid/51796
http://www.vulnerability-lab.com/get_content.php?id=115
https://exchange.xforce.ibmcloud.com/vulnerabilities/72831
http://packetstormsecurity.org/files/view/109238/VL-115.txt
http://www.securityfocus.com/bid/51796
http://www.vulnerability-lab.com/get_content.php?id=115
https://exchange.xforce.ibmcloud.com/vulnerabilities/72831
Products affected by CVE-2012-1063
Manageengine
»
Applications Manager
»
Version:
10.0
cpe:2.3:a:manageengine:applications_manager:10.0
Manageengine
»
Applications Manager
»
Version:
10.1
cpe:2.3:a:manageengine:applications_manager:10.1
Manageengine
»
Applications Manager
»
Version:
10.2
cpe:2.3:a:manageengine:applications_manager:10.2
Manageengine
»
Applications Manager
»
Version:
10.3
cpe:2.3:a:manageengine:applications_manager:10.3
Manageengine
»
Applications Manager
»
Version:
9.1
cpe:2.3:a:manageengine:applications_manager:9.1
Manageengine
»
Applications Manager
»
Version:
9.2
cpe:2.3:a:manageengine:applications_manager:9.2
Manageengine
»
Applications Manager
»
Version:
9.3
cpe:2.3:a:manageengine:applications_manager:9.3
Manageengine
»
Applications Manager
»
Version:
9.4
cpe:2.3:a:manageengine:applications_manager:9.4
Manageengine
»
Applications Manager
»
Version:
9.5
cpe:2.3:a:manageengine:applications_manager:9.5
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved