var-201102-0174
Vulnerability from variot

WebSCADA WS100 and WS200, Easy Connect EC150, Modbus RTU - TCP Gateway MB100, and Serial Ethernet Server SS100 on the IntelliCom NetBiter NB100 and NB200 platforms have a default username and password, which makes it easier for remote attackers to obtain superadmin access via the web interface, a different vulnerability than CVE-2009-4463. IntelliCom NetBiter NB100 and NB200 There are multiple vulnerabilities in products that run on the platform, including directory traversal. Other NB100 and NB200 Products that run on the platform may also be affected.By a third party with access to the product, superadmin Authority (Netbiter Top-level permissions ) By acquiring, system files and configuration files may be browsed. In addition, an arbitrary command may be executed by uploading malicious code. A remote attacker can gain access to the super administrator through the web interface

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201102-0174",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netbiter nb100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter easyconnect ec150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter webscada ws200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter modbus rtu-tcp gateway mb100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter nb200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter serial ethernet server ss100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter webscada ws100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter easy connect ec150",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter modbus rtu - tcp gateway mb100",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter serial ethernet server ss100",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter webscada ws100",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter webscada ws200",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "ws200",
        "scope": null,
        "trust": 0.6,
        "vendor": "webscada",
        "version": null
      },
      {
        "model": "ws100",
        "scope": null,
        "trust": 0.6,
        "vendor": "webscada",
        "version": null
      },
      {
        "model": "netbiter webscada ws200",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": "netbiter easyconnect ec150",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": "netbiter serial ethernet server ss100",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": "netbiter modbus rtu-tcp gateway mb100",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": "netbiter webscada ws100",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter easyconnect ec150",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter modbus rtu tcp gateway mb100",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter serial ethernet server ss100",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter webscada ws100",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter webscada ws200",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter nb100",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter nb200",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:intellicom:netbiter_easyconnect_ec150",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:intellicom:netbiter_modbus_rtu-tcp_gateway_mb100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:intellicom:netbiter_serial_ethernet_server_ss100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:intellicom:netbiter_webscada_ws100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:intellicom:netbiter_webscada_ws200",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      }
    ]
  },
  "cve": "CVE-2010-4733",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2010-4733",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2011-6676",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "4869abe2-2355-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "7d7b301e-463f-11e9-bb33-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-47338",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2010-4733",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#114560",
            "trust": 0.8,
            "value": "1.68"
          },
          {
            "author": "NVD",
            "id": "CVE-2010-4733",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2011-6676",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201102-228",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "4869abe2-2355-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "7d7b301e-463f-11e9-bb33-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-47338",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WebSCADA WS100 and WS200, Easy Connect EC150, Modbus RTU - TCP Gateway MB100, and Serial Ethernet Server SS100 on the IntelliCom NetBiter NB100 and NB200 platforms have a default username and password, which makes it easier for remote attackers to obtain superadmin access via the web interface, a different vulnerability than CVE-2009-4463. IntelliCom NetBiter NB100 and NB200 There are multiple vulnerabilities in products that run on the platform, including directory traversal. Other NB100 and NB200 Products that run on the platform may also be affected.By a third party with access to the product, superadmin Authority (Netbiter Top-level permissions ) By acquiring, system files and configuration files may be browsed. In addition, an arbitrary command may be executed by uploading malicious code. A remote attacker can gain access to the super administrator through the web interface",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2010-4733",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-10-316-01A",
        "trust": 3.3
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155",
        "trust": 0.8
      },
      {
        "db": "BUGTRAQ",
        "id": "20101001 [STANKOINFORMZASCHITA-10-01] NETBITER, WEBSCADA MULTIPLE VULNERABILITIES",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "4869ABE2-2355-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "7D7B301E-463F-11E9-BB33-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "id": "VAR-201102-0174",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      }
    ],
    "trust": 1.9541666666666666
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:19:04.015000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Netbiter webSCADA WS100 - Support",
        "trust": 0.8,
        "url": "http://support.intellicom.se/dynpage.cfm?FPID=85\u0026CatID=93\u0026SubCatID=297"
      },
      {
        "title": "Intellicom Innovation AB - SUPPORT",
        "trust": 0.8,
        "url": "http://support.intellicom.se"
      },
      {
        "title": "WebSCADA patch for multiple product weak password vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/37313"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-10-316-01a.pdf"
      },
      {
        "trust": 2.5,
        "url": "http://archives.neohapsis.com/archives/bugtraq/2010-10/0002.html"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4733"
      },
      {
        "trust": 0.8,
        "url": "http://support.intellicom.se"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4733"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu114560"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/114560"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-02-16T00:00:00",
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "date": "2011-02-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "date": "2011-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "date": "2011-03-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      },
      {
        "date": "2011-02-15T01:00:01.853000",
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-02-23T00:00:00",
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "date": "2011-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "date": "2011-03-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      },
      {
        "date": "2024-11-21T01:21:38.070000",
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WebSCADA Multiple Product Weak Password Vulnerabilities",
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ],
    "trust": 1.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Trust management",
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ],
    "trust": 1.0
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…