VAR-201312-0023
Vulnerability from variot - Updated: 2025-04-11 23:11Cross-site scripting (XSS) vulnerability in the web-wizard setup page on Cisco Scientific Atlanta D20 and D30 cable modems allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. The Cisco Scientific Atlanta D20/D30 is a wired modem device. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The device enables Internet access through a cable TV network
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201312-0023",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "scientific atlanta dpc\\/epc2425",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw730",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw939",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq2425",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw700",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq3925",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta wag310g",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3925",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpr362",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw941",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx\\/epx2100",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc 3208",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc2434",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc2325",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3825",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc3010",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx130",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta epc3925",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx\\/epx2203",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc2202",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq3212",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta epc3825",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc2100",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc2420",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc3212",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq2202",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx100\\/120",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc2203",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx213",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq\\/epq2160",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta epc2420",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3008\\/epc3008",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx2213",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3000\\/epc3000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx110",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc\\/epc2505",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx\\/epx2203c",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "model epc3925 8x4 docsis 3.0 with wireless residential gateway with edva",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2100 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2202 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2203 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2325 residential gateway with wireless access point",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2425 wireless residential gateway with embedded digital voice adapter",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2434 voip wireless home gateway",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2505 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc3010 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc3208 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc3212 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc2420 wireless residential gateway with embedded digital voice adapter",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3000/epc3000 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3008/epc3008 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3825 8x4 docsis 3.0 wireless residential gateway",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3925 8x4 docsis 3.0 wireless residential gateway with edva",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq/epq2160 docsis 2.0 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq2202 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq2425 wireless residential gateway with digital voice adapter",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq3212 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq3925 8x4 docsis 3.0 wireless residential gateway with edva",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpr/epr2320 cable modem with wireless access point",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpr2325 cable modem with wireless access point",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpr362 cable modem and router",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw700 wireless lan adapter pcmcia card",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw730 wireless networking adapter",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw939 usb wireless networking adapter",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw941 wireless ethernet adapter",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx/epx2100 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx/epx2203 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx/epx2203c voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx100/120 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx110 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx130 cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx213 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx2213 voip cable modem",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta epc2420 wireless residential gateway with embedded digital voice adapter",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta epc3825 8x4 docsis 3.0 wireless residential gateway",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta wag310g wireless-g adsl2+ gateway with voip",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta d20 and d30 cable modems",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta wag310g",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta epc3925",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta epc3825",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta epc2420",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx2213",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx213",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx130",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx110",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx100/120",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx/epx2203c",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx/epx2203",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpx/epx2100",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw941",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw939",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw730",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpw700",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpr362",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpr2325",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpr/epr2320",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq3925",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq3212",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq2425",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq2202",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpq/epq2160 docsis",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2"
},
{
"model": "scientific atlanta dpc3925",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3825",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3008/epc3008",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc3000/epc3000",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc2420",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc3010",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2505",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2434",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2425",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2325",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2203",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2202",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc2100",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "scientific atlanta dpc/epc",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3208"
},
{
"model": "dpc/epc3212 dpc/epc3212",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"db": "BID",
"id": "64408"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-176"
},
{
"db": "NVD",
"id": "CVE-2012-3047"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:cisco:epc3925",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc2100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc2202",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc2203",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc2325",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc2425",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc2434",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc2505",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc3010",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc_3208",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc%2fepc3212",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc2420",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc3000%2fepc3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc3008%2fepc3008",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc3825",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpc3925",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpq%2fepq2160",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpq2202",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpq2425",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpq3212",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpq3925",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpr%2Fepr2320",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpr2325",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpr362",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpw700",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpw730",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpw939",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpw941",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpx%2fepx2100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpx%2fepx2203",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpx%2fepx2203c",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpx100%2f120",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpx110",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpx130",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpx213",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_dpx2213",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_epc2420",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_epc3825",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:scientific_atlanta_wag310g",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "64408"
}
],
"trust": 0.3
},
"cve": "CVE-2012-3047",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2012-3047",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2013-15095",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-56328",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2012-3047",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2012-3047",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2013-15095",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201312-176",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-56328",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"db": "VULHUB",
"id": "VHN-56328"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-176"
},
{
"db": "NVD",
"id": "CVE-2012-3047"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site scripting (XSS) vulnerability in the web-wizard setup page on Cisco Scientific Atlanta D20 and D30 cable modems allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. The Cisco Scientific Atlanta D20/D30 is a wired modem device. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The device enables Internet access through a cable TV network",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-3047"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"db": "BID",
"id": "64408"
},
{
"db": "VULHUB",
"id": "VHN-56328"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-3047",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201312-176",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-15095",
"trust": 0.6
},
{
"db": "BID",
"id": "64408",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-56328",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"db": "VULHUB",
"id": "VHN-56328"
},
{
"db": "BID",
"id": "64408"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-176"
},
{
"db": "NVD",
"id": "CVE-2012-3047"
}
]
},
"id": "VAR-201312-0023",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"db": "VULHUB",
"id": "VHN-56328"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-15095"
}
]
},
"last_update_date": "2025-04-11T23:11:58.689000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "26036",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=26036"
},
{
"title": "Patch for Cisco Scientific Atlanta D20 D30 cable modems Cross-Site Scripting Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/41592"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-56328"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"db": "NVD",
"id": "CVE-2012-3047"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=26036"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3047"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3047"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"db": "VULHUB",
"id": "VHN-56328"
},
{
"db": "BID",
"id": "64408"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-176"
},
{
"db": "NVD",
"id": "CVE-2012-3047"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"db": "VULHUB",
"id": "VHN-56328"
},
{
"db": "BID",
"id": "64408"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"db": "CNNVD",
"id": "CNNVD-201312-176"
},
{
"db": "NVD",
"id": "CVE-2012-3047"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-12-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"date": "2013-12-10T00:00:00",
"db": "VULHUB",
"id": "VHN-56328"
},
{
"date": "2012-06-13T00:00:00",
"db": "BID",
"id": "64408"
},
{
"date": "2013-12-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"date": "2013-12-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201312-176"
},
{
"date": "2013-12-10T19:55:03.967000",
"db": "NVD",
"id": "CVE-2012-3047"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-12-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-15095"
},
{
"date": "2013-12-12T00:00:00",
"db": "VULHUB",
"id": "VHN-56328"
},
{
"date": "2012-06-13T00:00:00",
"db": "BID",
"id": "64408"
},
{
"date": "2013-12-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006095"
},
{
"date": "2013-12-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201312-176"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-3047"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201312-176"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Scientific Atlanta D20 and D30 Cable modem Web Wizard setup page cross-site scripting vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-006095"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201312-176"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…