Vulnerability Database
Blog
FAQ
Docs
CVE-2012-6071
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2012-6071
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2012-6071.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2012-6071
Related
UBUNTU-CVE-2012-6071
Published
2019-11-19T17:15:11Z
Modified
2024-11-21T01:45:45Z
Severity
7.5 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS Calculator
Summary
[none]
Details
nuSOAP before 0.7.3-5 does not properly check the hostname of a cert.
References
http://www.openwall.com/lists/oss-security/2012/12/27/1
http://www.openwall.com/lists/oss-security/2013/01/15/6
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696707
https://security-tracker.debian.org/tracker/CVE-2012-6071
Affected packages
Debian:11
/
nusoap
Package
Name
nusoap
Purl
pkg:deb/debian/nusoap?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0.7.3-5
Ecosystem specific
{ "urgency": "low" }
Debian:12
/
nusoap
Package
Name
nusoap
Purl
pkg:deb/debian/nusoap?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0.7.3-5
Ecosystem specific
{ "urgency": "low" }
CVE-2012-6071 - OSV