A Security Bypass vulnerability exists in the activate.asp page in Arial Software Campaign Enterprise 11.0.551, which could let a remote malicious user modify the SerialNumber field.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-10/0103.html | Broken Link |
http://sadgeeksinsnow.blogspot.dk/2012/10/my-first-experiences-bug-hunting-part-2.html | Exploit Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79508 | Third Party Advisory VDB Entry |
https://www.securityfocus.com/archive/1/524462 | Exploit Third Party Advisory VDB Entry |
https://www.securityfocus.com/bid/56117/info | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-01-10T19:21:51
Updated: 2020-01-10T19:21:51
Reserved: 2012-06-29T00:00:00
Link: CVE-2012-3821
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-01-10T20:15:14.193
Modified: 2020-01-22T18:56:10.753
Link: CVE-2012-3821
JSON object: View
Redhat Information
No data.
CWE