Vulnerabilites related to Unitronics - VisiLogic
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
cna@cyber.gov.il | https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
unitronics | visilogic | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:unitronics:visilogic:*:*:*:*:*:*:*:*", "matchCriteriaId": "86DA454F-6D1D-45DF-BDED-391D480C9A92", "versionEndExcluding": "9.9.01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unitronics Vision PLC \u2013\u00a0CWE-703: Improper Check or Handling of Exceptional Conditions may allow denial of service" }, { "lang": "es", "value": " Unitronics Vision PLC \u2013 CWE-703: La verificaci\u00f3n o el manejo inadecuado de condiciones excepcionales pueden permitir la denegaci\u00f3n de servicio" } ], "id": "CVE-2024-38435", "lastModified": "2025-07-21T14:18:16.400", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "cna@cyber.gov.il", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-21T08:15:05.780", "references": [ { "source": "cna@cyber.gov.il", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "sourceIdentifier": "cna@cyber.gov.il", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-703" } ], "source": "cna@cyber.gov.il", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ "cisaActionDue": "2023-12-18", "cisaExploitAdd": "2023-12-11", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Unitronics Vision PLC and HMI Insecure Default Password Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision1210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF1398A4-6BD7-48FF-8A65-7605DA38CE23", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision1210:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D6EFD3-61C3-4C4D-8B17-16591255EAE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision1040_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7C3337B-E349-4303-B387-088978CC823C", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision1040:-:*:*:*:*:*:*:*", "matchCriteriaId": "C91F4803-BC61-491F-9561-ECF043253B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BABAB394-7C0B-47F4-9D64-A7DB457B8C16", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision700:-:*:*:*:*:*:*:*", "matchCriteriaId": "38C892EC-1980-459E-9B1F-E9F0C703E758", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision570_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B92755D-CF8A-40BA-849D-5B04B6F389D2", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision570:-:*:*:*:*:*:*:*", "matchCriteriaId": "017A743B-AB98-4931-B7D6-F1062529B947", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D5026C4-18D6-4E6D-8CFA-FFC0BD2A0BF1", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision560:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E24B3A0-2FD9-4C13-9E89-F218B9CCED7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision430_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A743EA-B702-4E80-9130-C4A022540569", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A078DEE-DB79-4E33-BF48-849D6A26F0FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E442C02-4684-4A3C-AA8F-AC641CCA358C", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision350:-:*:*:*:*:*:*:*", "matchCriteriaId": "406D6FA9-4C05-4612-811E-A32E4516EBC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision130_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B1985-F0C0-4554-98FB-B358F42B9F65", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision130:-:*:*:*:*:*:*:*", "matchCriteriaId": "49A6FC0D-8687-4563-9C38-5AF0DCC46926", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision230_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "799F8466-30AC-4BD8-8AD5-35C2CFD98C37", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision230:-:*:*:*:*:*:*:*", "matchCriteriaId": "C360B7F4-9FDB-4143-87A0-1006C7C3A39C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision280_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7E91809-C43C-4ACD-9F26-448AD25E9EEF", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision280:-:*:*:*:*:*:*:*", "matchCriteriaId": "519F0192-4F48-4954-BAE1-8DC74BC0C017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision290_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECD944B5-2B08-4B9B-B0B0-17114FB58FB5", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision290:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A05131-B264-4858-A533-CBA5E229D40D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E702599A-8C23-4E13-B6D0-2E7CD7F20805", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision530:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A2DAADD-AD0E-43C5-B3CB-2F5445235C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:vision120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF329EB4-7AF2-48E5-AD8A-EC5C3E3C22EB", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:vision120:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF245A2D-9C93-41C2-AD88-8B2ABA026D5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:unitronics:visilogic:*:*:*:*:*:*:*:*", "matchCriteriaId": "168D1C28-7A90-4D17-A3EE-1EA5F8C7AA0D", "versionEndExcluding": "9.9.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:samba_3.5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F976824-529B-4A9D-8C8B-A77F2C73819C", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:samba_3.5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A510D42F-9299-4744-923E-1C828668431E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:samba_4.3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F3A2432-151D-4F10-A2A6-A39DCB3D43EE", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:samba_4.3:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB661A2E-DED6-4BD7-9757-7592E786FD0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unitronics:samba_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41B9A502-15B8-45DB-B169-B0317EC50EBF", "versionEndExcluding": "12.38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:unitronics:samba_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "66362CAA-4499-465D-86B2-1823DE372137", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.\n" }, { "lang": "es", "value": "Los PLC y HMI de Unitronics Vision Series utilizan contrase\u00f1as administrativas predeterminadas. Un atacante no autenticado con acceso a la red de un PLC o HMI puede tomar el control administrativo del sistema." } ], "id": "CVE-2023-6448", "lastModified": "2025-01-27T21:52:49.177", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "9119a7d8-5eab-497f-8521-727c672e3725", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-05T18:15:12.643", "references": [ { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Vendor Advisory" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Release Notes" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems" }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "tags": [ "Product" ], "url": "https://www.unitronicsplc.com/cyber_security_vision-samba/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.unitronicsplc.com/cyber_security_vision-samba/" } ], "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "9119a7d8-5eab-497f-8521-727c672e3725", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2024-38435 (GCVE-0-2024-38435)
Vulnerability from cvelistv5
- CWE-703 - Improper Check or Handling of Exceptional Conditions
Vendor | Product | Version | ||
---|---|---|---|---|
Unitronics | Vision PLC |
Version: All versions < Upgrade to v9.9.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38435", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-22T11:51:46.970559Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-22T11:51:57.805Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:12:24.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Vision PLC", "vendor": "Unitronics", "versions": [ { "lessThan": "Upgrade to v9.9.1", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Claroty Research \u2013 Team 82" } ], "datePublic": "2024-07-18T07:05:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUnitronics Vision PLC \u2013\u0026nbsp;\u003c/span\u003eCWE-703: Improper Check or Handling of Exceptional Conditions may allow denial of service\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cp\u003e\u0026nbsp;\u003c/p\u003e\n\n\u003c/span\u003e" } ], "value": "Unitronics Vision PLC \u2013\u00a0CWE-703: Improper Check or Handling of Exceptional Conditions may allow denial of service" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703: Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-21T07:10:04.460Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to v9.9.1\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "Upgrade to v9.9.1" } ], "source": { "advisory": "ILVN-2024-0173", "discovery": "UNKNOWN" }, "title": "Unitronics Vision PLC - CWE-703: Improper Check or Handling of Exceptional Conditions", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2024-38435", "datePublished": "2024-07-21T07:10:04.460Z", "dateReserved": "2024-06-16T08:00:52.286Z", "dateUpdated": "2024-08-02T04:12:24.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6448 (GCVE-0-2023-6448)
Vulnerability from cvelistv5
- CWE-1188 - Insecure Default Initialization of Resource
Vendor | Product | Version | ||
---|---|---|---|---|
Unitronics | VisiLogic |
Version: 0 < 9.9.00 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:28:21.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems" }, { "tags": [ "x_transferred" ], "url": "https://www.unitronicsplc.com/cyber_security_vision-samba/" }, { "tags": [ "release-notes", "x_transferred" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:unitronics:visilogic:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "visilogic", "vendor": "unitronics", "versions": [ { "lessThan": "9.9.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-6448", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-12-06T14:07:21.216497Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-12-11", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-6448" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:10.634Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2023-12-11T00:00:00+00:00", "value": "CVE-2023-6448 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "VisiLogic", "vendor": "Unitronics", "versions": [ { "lessThan": "9.9.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2023-11-28T05:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.\u003cbr\u003e" } ], "value": "Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-19T16:23:39.022Z", "orgId": "9119a7d8-5eab-497f-8521-727c672e3725", "shortName": "cisa-cg" }, "references": [ { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems" }, { "url": "https://www.unitronicsplc.com/cyber_security_vision-samba/" }, { "tags": [ "release-notes" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf" }, { "tags": [ "vendor-advisory" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unitronics VisiLogic uses a default administrative password", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9119a7d8-5eab-497f-8521-727c672e3725", "assignerShortName": "cisa-cg", "cveId": "CVE-2023-6448", "datePublished": "2023-12-05T17:43:40.451Z", "dateReserved": "2023-11-30T18:40:51.463Z", "dateUpdated": "2025-07-30T01:37:10.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201601-0061
Vulnerability from variot
Heap-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.09 allows remote attackers to execute arbitrary code via a long vlp filename. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within parsing of vlp files. A specially crafted vlp will overrun a heap buffer and inject values past the end of the heap allocation. An attacker can leverage this vulnerability to execute arbitrary code under the context of local Administrator. Unitronics VisiLogic OPLC IDE is a set of human machine interface (HMI) and PLC application programming environments for Vision and SAMBA series controllers from Unitronics, Israel. Failed exploit attempts will likely result in denial-of-service conditions. Unitronics VisiLogic OPLC IDE 9.8.0.00 and prior versions are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201601-0061", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "visilogic oplc ide", "scope": null, "trust": 1.3, "vendor": "unitronics", "version": null }, { "model": "visilogic oplc ide", "scope": "lte", "trust": 1.0, "vendor": "unitronics", "version": "9.8.0.00" }, { "model": "visilogic oplc ide", "scope": "lt", "trust": 0.8, "vendor": "unitronics", "version": "9.8.09" }, { "model": "visilogic oplc ide", "scope": "eq", "trust": 0.6, "vendor": "unitronics", "version": "9.8.0.00" }, { "model": "visilogic", "scope": "eq", "trust": 0.3, "vendor": "unitronics", "version": "9.8.0.00" }, { "model": "visilogic", "scope": "ne", "trust": 0.3, "vendor": "unitronics", "version": "9.8.9" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "visilogic oplc ide", "version": "*" } ], "sources": [ { "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-16-001" }, { "db": "CNVD", "id": "CNVD-2016-00142" }, { "db": "BID", "id": "79897" }, { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "CNNVD", "id": "CNNVD-201601-121" }, { "db": "NVD", "id": "CVE-2015-7939" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:unitronics:visilogic_oplc_ide", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006779" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Steven Seeley of Source Incite", "sources": [ { "db": "ZDI", "id": "ZDI-16-001" }, { "db": "BID", "id": "79897" }, { "db": "CNNVD", "id": "CNNVD-201601-121" } ], "trust": 1.6 }, "cve": "CVE-2015-7939", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2015-7939", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 2.5, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2016-00142", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "661d78c0-2351-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2015-7939", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-7939", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2015-7939", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2015-7939", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-00142", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201601-121", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-16-001" }, { "db": "CNVD", "id": "CNVD-2016-00142" }, { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "CNNVD", "id": "CNNVD-201601-121" }, { "db": "NVD", "id": "CVE-2015-7939" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.09 allows remote attackers to execute arbitrary code via a long vlp filename. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within parsing of vlp files. A specially crafted vlp will overrun a heap buffer and inject values past the end of the heap allocation. An attacker can leverage this vulnerability to execute arbitrary code under the context of local Administrator. Unitronics VisiLogic OPLC IDE is a set of human machine interface (HMI) and PLC application programming environments for Vision and SAMBA series controllers from Unitronics, Israel. Failed exploit attempts will likely result in denial-of-service conditions. \nUnitronics VisiLogic OPLC IDE 9.8.0.00 and prior versions are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2015-7939" }, { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "ZDI", "id": "ZDI-16-001" }, { "db": "CNVD", "id": "CNVD-2016-00142" }, { "db": "BID", "id": "79897" }, { "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-7939", "trust": 4.2 }, { "db": "ZDI", "id": "ZDI-16-001", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-15-274-02A", "trust": 2.4 }, { "db": "CNVD", "id": "CNVD-2016-00142", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201601-121", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006779", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-2905", "trust": 0.7 }, { "db": "BID", "id": "79897", "trust": 0.3 }, { "db": "IVD", "id": "661D78C0-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-16-001" }, { "db": "CNVD", "id": "CNVD-2016-00142" }, { "db": "BID", "id": "79897" }, { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "CNNVD", "id": "CNNVD-201601-121" }, { "db": "NVD", "id": "CVE-2015-7939" } ] }, "id": "VAR-201601-0061", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00142" } ], "trust": 1.3869565000000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2016-00142" } ] }, "last_update_date": "2024-11-23T22:18:17.385000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Download - VisiLogic (Vision Series)", "trust": 0.8, "url": "http://www.unitronics.com/support/downloads" }, { "title": "Unitronics has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-274-02A" }, { "title": "Patch for Unitronics VisiLogic OPLC IDE Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/69723" }, { "title": "Unitronics VisiLogic OPLC IDE Fixes for heap-based buffer overflow vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59477" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-001" }, { "db": "CNVD", "id": "CNVD-2016-00142" }, { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "CNNVD", "id": "CNNVD-201601-121" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "NVD", "id": "CVE-2015-7939" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-274-02a" }, { "trust": 2.2, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-001" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7939" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7939" }, { "trust": 0.3, "url": "http://www.unitronics.com/" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-001/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-001" }, { "db": "CNVD", "id": "CNVD-2016-00142" }, { "db": "BID", "id": "79897" }, { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "CNNVD", "id": "CNNVD-201601-121" }, { "db": "NVD", "id": "CVE-2015-7939" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-16-001" }, { "db": "CNVD", "id": "CNVD-2016-00142" }, { "db": "BID", "id": "79897" }, { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "CNNVD", "id": "CNNVD-201601-121" }, { "db": "NVD", "id": "CVE-2015-7939" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-11T00:00:00", "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" }, { "date": "2016-01-06T00:00:00", "db": "ZDI", "id": "ZDI-16-001" }, { "date": "2016-01-11T00:00:00", "db": "CNVD", "id": "CNVD-2016-00142" }, { "date": "2016-01-06T00:00:00", "db": "BID", "id": "79897" }, { "date": "2016-01-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "date": "2016-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-121" }, { "date": "2016-01-09T02:59:12.893000", "db": "NVD", "id": "CVE-2015-7939" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-06T00:00:00", "db": "ZDI", "id": "ZDI-16-001" }, { "date": "2016-01-11T00:00:00", "db": "CNVD", "id": "CNVD-2016-00142" }, { "date": "2016-01-06T00:00:00", "db": "BID", "id": "79897" }, { "date": "2016-01-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "date": "2016-01-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-121" }, { "date": "2024-11-21T02:37:42.090000", "db": "NVD", "id": "CVE-2015-7939" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-121" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unitronics VisiLogic OPLC IDE Heap-based buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006779" }, { "db": "CNNVD", "id": "CNNVD-201601-121" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "661d78c0-2351-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201601-121" } ], "trust": 0.8 } }