var-201202-0046
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4510. plural Siemens Product HMI Web The server contains a cross-site scripting vulnerability. This vulnerability is CVE-2011-4510 This is a different vulnerability.By any third party, Web Script or HTML May be inserted. Siemens SIMATIC is an automation software in a single engineering environment. The SIMATIC HMI Smart Options web server has two separate cross-site scripting attacks that allow elevation of privilege, stealing data or corrupting services. SIMATIC HMI is prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201202-0046", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "simatic hmi panels", "scope": "eq", "trust": 2.4, "vendor": "siemens", "version": "mp" }, { "model": "simatic hmi panels", "scope": "eq", "trust": 2.4, "vendor": "siemens", "version": "op" }, { "model": "simatic hmi panels", "scope": "eq", "trust": 2.4, "vendor": "siemens", "version": "tp" }, { "model": "simatic hmi panels", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "comfort_panels" }, { "model": "wincc runtime advanced", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "v11" }, { "model": "wincc", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "v11" }, { "model": "simatic hmi panels", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "mobile_panels" }, { "model": "simatic wincc flexible", "scope": "eq", "trust": 1.4, "vendor": "siemens", "version": "2007" }, { "model": "simatic wincc flexible", "scope": "eq", "trust": 1.4, "vendor": "siemens", "version": "2005" }, { "model": "simatic wincc flexible", "scope": "eq", "trust": 1.4, "vendor": "siemens", "version": "2004" }, { "model": "wincc flexible", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2004" }, { "model": "wincc flexible runtime", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "wincc flexible", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2007" }, { "model": "wincc", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "v11" }, { "model": "wincc flexible", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2005" }, { "model": "wincc flexible", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2008" }, { "model": "simatic hmi panels", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "comfort panels" }, { "model": "simatic hmi panels", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "mobile panels" }, { "model": "simatic wincc", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "v11 sp2 update 1" }, { "model": "simatic wincc flexible", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "2008 sp3" }, { "model": "simatic wincc flexible rumtime", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic wincc runtime advanced", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "v11" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "wincc flexible", "version": "2008" }, { "model": "simatic wincc flexible runtime", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic wincc runtime advanced", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic wincc flexible", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2008" }, { "model": "simatic hmi panels", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic wincc", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic wincc", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v11" }, { "model": "wincc flexible runtime", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "wincc", "version": "v11" }, { "model": "simatic hmi smart options", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic hmi", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "wincc flexible", "version": "2004" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "wincc flexible", "version": "2005" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "wincc flexible", "version": "2007" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "wincc", "version": "*" }, { "model": "comfort panels", "scope": null, "trust": 0.2, "vendor": "simatic hmi panels", "version": null }, { "model": "mobile panels", "scope": null, "trust": 0.2, "vendor": "simatic hmi panels", "version": null }, { "model": "mp", "scope": null, "trust": 0.2, "vendor": "simatic hmi panels", "version": null }, { "model": "op", "scope": null, "trust": 0.2, "vendor": "simatic hmi panels", "version": null }, { "model": "tp", "scope": null, "trust": 0.2, "vendor": "simatic hmi panels", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "wincc runtime advanced", "version": "v11" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "wincc flexible runtime", "version": "*" } ], "sources": [ { "db": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0461" }, { "db": "BID", "id": "51835" }, { "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "db": "CNNVD", "id": "CNNVD-201202-086" }, { "db": "NVD", "id": "CVE-2011-4511" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:siemens:simatic_hmi_panels", "vulnerable": true }, { "cpe22Uri": "cpe:/a:siemens:simatic_wincc_%28tia_portal%29", "vulnerable": true }, { "cpe22Uri": "cpe:/a:siemens:wincc_flexible", "vulnerable": true }, { "cpe22Uri": "cpe:/a:siemens:wincc_flexible_runtime", "vulnerable": true }, { "cpe22Uri": "cpe:/a:siemens:wincc_runtime_advanced", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001313" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Billy Rios, Terry McCorkle, Shawn Merdinger, and Luigi Auriemma.", "sources": [ { "db": "BID", "id": "51835" } ], "trust": 0.3 }, "cve": "CVE-2011-4511", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2011-4511", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "28629d64-2354-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-52456", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4511", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4511", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201202-086", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-52456", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2011-4511", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-52456" }, { "db": "VULMON", "id": "CVE-2011-4511" }, { "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "db": "CNNVD", "id": "CNNVD-201202-086" }, { "db": "NVD", "id": "CVE-2011-4511" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4510. plural Siemens Product HMI Web The server contains a cross-site scripting vulnerability. This vulnerability is CVE-2011-4510 This is a different vulnerability.By any third party, Web Script or HTML May be inserted. Siemens SIMATIC is an automation software in a single engineering environment. The SIMATIC HMI Smart Options web server has two separate cross-site scripting attacks that allow elevation of privilege, stealing data or corrupting services. SIMATIC HMI is prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks", "sources": [ { "db": "NVD", "id": "CVE-2011-4511" }, { "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "db": "CNVD", "id": "CNVD-2012-0461" }, { "db": "BID", "id": "51835" }, { "db": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-52456" }, { "db": "VULMON", "id": "CVE-2011-4511" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4511", "trust": 3.7 }, { "db": "ICS CERT", "id": "ICSA-12-030-01", "trust": 3.5 }, { "db": "SIEMENS", "id": "SSA-345442", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-201202-086", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2012-0461", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-001313", "trust": 0.8 }, { "db": "NSFOCUS", "id": "19403", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-12-030-01A", "trust": 0.4 }, { "db": "BID", "id": "51835", "trust": 0.4 }, { "db": "IVD", "id": "28629D64-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-52456", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2011-4511", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0461" }, { "db": "VULHUB", "id": "VHN-52456" }, { "db": "VULMON", "id": "CVE-2011-4511" }, { "db": "BID", "id": "51835" }, { "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "db": "CNNVD", "id": "CNNVD-201202-086" }, { "db": "NVD", "id": "CVE-2011-4511" } ] }, "id": "VAR-201202-0046", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0461" }, { "db": "VULHUB", "id": "VHN-52456" } ], "trust": 1.52394115 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0461" } ] }, "last_update_date": "2024-11-23T21:46:30.355000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-345442", "trust": 0.8, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "title": "\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d1\u30fc\u30c8\u30ca\u30fc", "trust": 0.8, "url": "http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.siemens.com/entry/jp/ja/" }, { "title": "Patch for Siemens SIMATIC WinCC HMI Cross-Site Scripting Vulnerability (CNVD-2012-0461)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/9059" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0461" }, { "db": "JVNDB", "id": "JVNDB-2012-001313" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-52456" }, { "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "db": "NVD", "id": "CVE-2011-4511" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-030-01.pdf" }, { "trust": 1.8, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4511" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4511" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19403" }, { "trust": 0.3, "url": "http://www.automation.siemens.com/mcms/automation/en/human-machine-interface/pages/default.aspx" }, { "trust": 0.3, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-030-01a.pdf" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/51835" }, { "trust": 0.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-12-030-01a" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0461" }, { "db": "VULHUB", "id": "VHN-52456" }, { "db": "VULMON", "id": "CVE-2011-4511" }, { "db": "BID", "id": "51835" }, { "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "db": "CNNVD", "id": "CNNVD-201202-086" }, { "db": "NVD", "id": "CVE-2011-4511" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0461" }, { "db": "VULHUB", "id": "VHN-52456" }, { "db": "VULMON", "id": "CVE-2011-4511" }, { "db": "BID", "id": "51835" }, { "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "db": "CNNVD", "id": "CNNVD-201202-086" }, { "db": "NVD", "id": "CVE-2011-4511" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-07T00:00:00", "db": "IVD", "id": "28629d64-2354-11e6-abef-000c29c66e3d" }, { "date": "2012-02-07T00:00:00", "db": "CNVD", "id": "CNVD-2012-0461" }, { "date": "2012-02-03T00:00:00", "db": "VULHUB", "id": "VHN-52456" }, { "date": "2012-02-03T00:00:00", "db": "VULMON", "id": "CVE-2011-4511" }, { "date": "2012-01-30T00:00:00", "db": "BID", "id": "51835" }, { "date": "2012-02-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "date": "2012-02-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-086" }, { "date": "2012-02-03T20:55:01.407000", "db": "NVD", "id": "CVE-2011-4511" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-07T00:00:00", "db": "CNVD", "id": "CNVD-2012-0461" }, { "date": "2012-02-06T00:00:00", "db": "VULHUB", "id": "VHN-52456" }, { "date": "2012-02-06T00:00:00", "db": "VULMON", "id": "CVE-2011-4511" }, { "date": "2012-04-18T21:20:00", "db": "BID", "id": "51835" }, { "date": "2012-02-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001313" }, { "date": "2012-02-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-086" }, { "date": "2024-11-21T01:32:27.130000", "db": "NVD", "id": "CVE-2011-4511" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201202-086" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Siemens Product HMI Web Server vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001313" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201202-086" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.